Deception technologies are on the forefront of the battle to secure an organization's digital assets. Such technologies build on top of traditional detection technologies, which focus on finding evil, to uncover attacker behaviors that avoid looking malicious to penetrate organizational defenses. But how does that work in real life?
In this webcast, attendees will learn:
Register today to be among the first to receive the associated whitepaper written by SANS Analyst and network/cloud security expert Kyle Dickinson.