Deception technology is far more sophisticated than the traditional honeypot. Today’s deceptions look and feel like the real deal, but will attackers take the bait?
If you are a Star Trek: The Next Generation aficionado, you might recall the episode "Ship in a Bottle" where Sherlock Holmes' archenemy Prof. James Moriarty took control of the Enterprise from the holodeck and threatened to destroy the ship unless his demands were met. The threat was averted when the holodeck program was rewritten to create a false reality within live memory. The Moriarty program was deceived and redirected to the false but realistic pseudo reality and the Enterprise was saved.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.