Gartner Blog Network

Tag: 'honeytokens' Blog Posts

from the Gartner Blog Network

Deception Technologies - The Paper

by Augusto Barros  |  November 18, 2016

After some very fun research, we're finally publishing our paper on deception technologies: Applying Deception Technologies and Techniques to Improve Threat Detection and Response 18 November 2016 | ID: G00314562...

Read more »

Deception as a Feature

by Augusto Barros  |  September 30, 2016

One of the things we are also covering as part of our research on deception technologies is the inclusion of deception techniques as features in other security products. There are...

Read more »

New Research: Deception Technologies!

by Augusto Barros  |  September 13, 2016

With the work on our upcoming SOC paper and on the TI paper refresh winding down, we are preparing to start some exciting research in our new project: Deception Technologies!...

Read more »

Yes, Give Deception a Chance!

by Augusto Barros  |  January 14, 2016

So, Anton finally brought the deception subject up on his blog, leaving a small bait for me at the end of his post. Ok, that's a great subject to return...

Read more »

Honeytokens Everywhere

by Augusto Barros  |  July 28, 2015

A few days ago I was reading about features of a "next-gen" threat detection tool and found out it was capable of planting and monitoring Honeytokens in Active Directory. I...

Read more »