“For a long time, we focused on defending the perimeter and thought that was enough to keep businesses safe,” stated Ram Varadarajan, CEO and Co-founder of Acalvio. “It’s like putting locks on doors. The problem is that more people are finding ways to cross those boundaries and enter your business at an alarming rate.”

In the recent episode of The Security Strategist podcast, Chris Steffen, the Vice President of Security Research at Enterprise Management Associates (EMA), sits down with Varadarajan, to talk about how deception is changing threat detection in compromised enterprise environments.

The CEO of Acalvio, alluding to the main issue in modern cybersecurity, explains that the old security model, which aims to create an impenetrable perimeter, is no longer enough. Attackers, equipped with more advanced tools, are discovering new methods to bypass these defences. The old "fortress mentality" is outdated.

Assume Compromise!

Both Varadarajan and Steffen agree that modern-day cybersecurity is not a matter of if an attacker will get in, but it's about anticipating when the attacker will get in. This mindset, referred to as "assumed compromise," means that a determined attacker will eventually find a way inside your network, especially with AI in the picture.

Varadarajan explains, "The defender has to be right all the time in stopping the attacker at the door, whereas the attacker needs to be only right once to get past the perimeter and get inside the house."

This imbalance gives attackers a significant edge. The vast number of entry points—from on-premise systems to cloud services and remote access—makes it impossible to secure each one perfectly. Consequently, the focus should be on what happens after an attacker is inside.

So, how are businesses approaching such constantly looming threats?

Deception: A Preemptive Strike

This is where deception technology becomes an effective, proactive defense strategy. Instead of waiting for a breach to happen and then trying to fix the damage, deception actively engages and misleads the attacker.

"If you're assuming that the attacker is going to be inside, the question is how do you find these attackers and bad actors quickly and precisely so that you can conduct the enterprise's business?,” elucidates Varadarajan.

Deception technology creates a web of fake assets, data, and credentials, forming a digital minefield for attackers. When an attacker tries to move laterally through the network or gain higher privileges, they interact with these decoys. This interaction provides an immediate, clear signal that a malicious actor is present, allowing defenders to stop them before they can reach their real target.

The old methods of securing a network are no longer enough, agree both Varadarajan and Steffen. The rise of sophisticated, AI-driven attacks requires a new, proactive approach.

"Preemptive defense based on deception is a very legitimate and well-understood way of solving this problem,” stated Varadarajan.

Enterprises are advised to switch strategy from defending the perimeter to actively deceiving and identifying within the network. This would help organisations to regain control. Deception technology offers a vital home-field advantage, making it an important part of any modern cybersecurity strategy.

Takeaways

  • Deception technology is a natural and effective strategy in cybersecurity.
  • Traditional perimeter defenses are no longer sufficient against modern threats.
  • The 'assumed breach' mindset is essential for contemporary cybersecurity strategies.
  • Operationalizing deception technology can significantly enhance threat detection.
  • AI can streamline the creation and management of deception environments.
  • Preemptive defense is more effective than reactive strategies in cybersecurity.
  • Organizations must adapt to the increasing number of entry points into their networks.
  • Reducing dwell time for attackers is crucial for effective defense.
  • Cybersecurity strategies should account for both external and internal threats.
  • Deception technology can help identify both active attackers and dormant malware.

Chapters

  • 00:00 Introduction to Cybersecurity Challenges
  • 03:05 Understanding Deception Technology
  • 06:14 Shortcomings of Conventional Cybersecurity
  • 09:11 The Shift from Fortress Mentality
  • 12:03 Assumed Breach: The New Normal
  • 15:00 Operationalizing Deception Technology
  • 18:01 The Role of AI in Cybersecurity
  • 21:03 Velocity of Cyber Attacks
  • 23:46 Preemptive Defense Strategies
  • 26:59 Key Takeaways and Conclusion