Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Deception as a Service, the Next Tool to Add to Your Cyber Arsenal

by Jenna Sindle
November 6, 2019
in Cybersecurity
Reading Time: 3 mins read
A A
Deception as a Service, the Next Tool to Add to Your Cyber Arsenal
Share on FacebookShare on Twitter

As well as death and taxes, the one thing that you can be certain of in 2019 is that your online presence and information is under attack. While these unrelenting cyber attacks are a concern for everyone, those charged with protecting citizen data and national security for federal government agencies are particularly concerned.

The good news is a new tool exists that will fortify the defenses protecting critical information. According to Ray Bauer, Managing Director, Public Sector, Cybersecurity & Advanced Communications at Verizon, Deception as a Service (DaaS) is the latest tool that federal Infosec teams should consider adding to their cyber arsenal. “Deception as a Service helps level the playing field by making it much more difficult for attackers to know what is real and what is a decoy,” he shared.

DaaS creates an environment of realistic decoys – everything from dummy data sets to bogus credentials and ransomware bait – to confuse attackers and cause them to identify themselves as they attack the decoys in search of the real target. As well as deceiving external attackers, deploying decoys assists in insider threat mitigation by identifying agency team members who stray into unauthorized areas and significantly reduces dwell time of APTs.

“Deploying Deception as a Service might seem like it would be a heavy lift, or resource intensive,” says Bauer. “However, with virtualization tools the time to set up is minimal, especially when you consider the return on investment. Deception as a Service also relieves the most common stressors on an InfoSec team. There’s no tuning, nothing to configure, no updates to make, and, most importantly, no alert fatigue.”

As federal agencies collaborate with both private sector MSSPs and with each other as part of the Department of Homeland Security’s Continuous Diagnostics and Mitigation Program to combat cyber threats, being able to construct the broadest view of the nation’s cyber risk is a vital and viable proposition. The information that can be gathered by agencies employing Deception as a Service will aid in better understanding of risk – from the context of an attack to its unique signatures – and will improve the security and stability of the nation.

Tags: Castle and Moat SecurityDeception as a ServiceInsider ThreatIoT SecurityMitigating Insider ThreatsNetwork-Based AnomalyNext-Gen Cyber SolutionsReducing Dwell timeSecurity DecoyVerizon Deception as a Service

RELATED POSTS

IoT Devices
Security

As IoT Devices Put Government Agencies at Risk, Securing Endpoints Has Never Been More Important

March 11, 2021
Connected Devices
CIO Perspective

Is There an Acceptable Balance Between Connection and Security?

April 10, 2020
Protecting Next-Generation Federal Networks from Cyber Attacks
Cybersecurity

Protecting Next-Generation Federal Networks from Cyber Attacks

October 8, 2019

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    8340 shares
    Share 3336 Tweet 2085
  • For CBP and DHS, AI Reveals Meaningful Connections from Disparate Data

    17 shares
    Share 7 Tweet 4
  • The Five Pillars of Zero Trust Architecture

    340 shares
    Share 136 Tweet 85
  • Identifying the Building Blocks for a Successful Zero Trust Journey

    22 shares
    Share 9 Tweet 6

CONNECT WITH US

Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us