deception, detection & delay

delay tactic - confusing crossroads

Active Deception Through Cyber Maneuver The concept of dynamic identity can play a significant role in deception and adaptive defenses. Static mappings of identities create vulnerabilities that undermine protections and facilitate asset theft. For example, static passwords, static credit card numbers, static asset tags, and static IP addresses simplify the tasks of a malicious adversary […]

Cyber detection, deception and delay

Active cyber defense offers deception, delay and persistent detection approaches to disrupt cyber attacks while also increasing the work factor for the attacker. By camouflaging defenses, deception can provide real-time insight to a threat actor’s TTPs while delaying an attacker’s ability to launch a successful attack. Adaptive and persistent detective capabilities can expose stealthy malware […]

caught cyber criminal

Choose Your Deception Active Cyber Defense can enable a large variety of specific deception tactics that can delay, confuse, scare away, or tie up an attacker depending on the circumstances and the methods.┬áThe following examples highlight this variety of tactics. Enabling specific abuse detection points in web application code using a library of vulnerability deception […]