Top 10 Best Public DNS Servers for 2024
Intercepting Attackers with Deceptive Technology
![](/sites/default/files/styles/cropper_main_image/public/2021-11/Podcast%20Carolyn.png.webp?itok=GYrayaTK)
Year on year, cybercriminals are expanding their attack toolkits and coming up with different ways to cause disruption across the enterprise. However, according to cybersecurity experts, deceptive technology can be used to effectively intercept these crimes.
The Power of Deceptive Technology
Investigating this destructive attack vector in this week’s episode of the Next Phase of Cybersecurity is Carolyn Crandall, Chief Security Advocate at Attivo Networks. Carolyn first featured on the EM360 Podcast to talk about deception technology and its ability to turn the table on attackers. This time, she is here to set out how to disrupt attackers’ toolkits and ultimately render them powerless.
Join 34,209 IT professionals who already have a head start
Recommended Content
Trending Content
Critical NHS Hospital Appointments Cancelled After Synnovis Cyber Attack
![](https://em360tech.com/sites/default/files/styles/author_image/public/linkedinImages/user-picture-4489-1706648130914.jpeg.webp?itok=NigAG2DT)
Hackers Race Off With F1 Data Following FIA Cyber Attack
![](https://em360tech.com/sites/default/files/styles/author_image/public/2023-12/profile-picture_0.jpeg.webp?itok=rtZQ0QtV)
Palo Alto Networks: Bridging the Gap between Cloud Security and the SOC
![](https://em360tech.com/sites/default/files/styles/default_logo/public/2023-12/palo%20alto%20networks%20png%20logo%20.png.webp?itok=McSAzr_K)
Top 10 Best DCIM Software Solutions for 2024
![](https://em360tech.com/sites/default/files/styles/author_image/public/2023-12/profile-picture_0.jpeg.webp?itok=rtZQ0QtV)