When the Attacker Becomes the Prey: Trapping Hackers in Your Network

A recent webinar by Topspin Security (The Art of Deception: Lure, Confuse, Defeat) explained how enterprises could use cyber attacks to their own advantage. Presenter, Rami Mizrahi, elaborated on a strategy that is based on the premise that nothing will keep a dedicated attacker out of your network. That being the case, it may be … Continue reading When the Attacker Becomes the Prey: Trapping Hackers in Your Network