Intercepting Attackers with Deceptive Technology
Year on year, cybercriminals are expanding their attack toolkits and coming up with different ways to cause disruption across the enterprise. However, according to cybersecurity experts, deceptive technology can be used to effectively intercept these crimes.
The Power of Deceptive Technology
Investigating this destructive attack vector in this week's episode of the Next Phase of Cybersecurity is Carolyn Crandall, Chief Security Advocate at Attivo Networks. Carolyn first featured on the EM360 Podcast to talk about deception technology and its ability to turn the table on attackers. This time, she is here to set out how to disrupt attackers' toolkits and ultimately render them powerless.