back to article Look into our network, not around our network... you're under

Tactics successfully deployed by Field Marshal Bernard Law Montgomery against German Army officer Erwin Rommel in the battle of El Alamein have been applied in a cyber-technology that aims to outfox hackers. During the important WWII battle, allied forces deployed dummy tanks consisting of plywood frames placed over jeeps as a …

  1. allthecoolshortnamesweretaken

    3, 2, 1, you're back in the room.

    Interesting approach - provided Illusive Networks are better at what they do than Kenny Craig.

  2. nobody_important

    ...and if those dummy networks don't have any real traffic moving around, will anyone notice...?

  3. Anonymous Coward
    Anonymous Coward

    Providers like Attivo Networks offer deceptions that do generate traffic and other deceptions so that they appear as authentic assets. Deception technology is proving to be an efficient and effective way for detecting advanced targeted, stolen credential, and ransomware attacks, worth a look for organizations wanting to add detection in addition to prevention infrastructure.

  4. JJKing
    Facepalm

    There were also dummy airfields setup with dummy aircraft that the Germans dropped dummy bombs on. Who said the Germans didn't have a sense of humour. So for every dummy network there is likely to be a dummy hacking it.

  5. Oengus

    Hasn't this been called a "Honey Pot" for years?

  6. ksm44

    Deception is only effective if implemented strategically

    Deception is listed as one of the top 10 technologies by gartner in 2016. Its still early days, however nice to see companies like Illusive networks and Smokescreen technologies offering agentless deception options.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2020