<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Deception tools:  Deception Networks in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Deception-tools-Deception-Networks/m-p/17190#M725</link>
    <description>&lt;P&gt;I imagine all of us remember the decoy networks with their sacrificial servers and monitoring systems.&amp;nbsp; What about Deception tools with deception networks?&amp;nbsp; &lt;A href="https://www.scmagazine.com/home/security-news/malware/next-generation-tools-deception-networks/?utm_source=newsletter&amp;amp;utm_medium=email&amp;amp;utm_campaign=SCUS_Newswire_20181220&amp;amp;hmSubId=ZK87kHs9IPI1&amp;amp;email_hash=e218d015fde22c2df6dc686cc6b0add0&amp;amp;mpweb=1325-4636-127726" target="_blank"&gt;https://www.scmagazine.com/home/security-news/malware/next-generation-tools-deception-networks/?utm_source=newsletter&amp;amp;utm_medium=email&amp;amp;utm_campaign=SCUS_Newswire_20181220&amp;amp;hmSubId=ZK87kHs9IPI1&amp;amp;email_hash=e218d015fde22c2df6dc686cc6b0add0&amp;amp;mpweb=1325-4636-127726&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
    <pubDate>Thu, 20 Dec 2018 21:03:49 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2018-12-20T21:03:49Z</dc:date>
    <item>
      <title>Deception tools:  Deception Networks</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Deception-tools-Deception-Networks/m-p/17190#M725</link>
      <description>&lt;P&gt;I imagine all of us remember the decoy networks with their sacrificial servers and monitoring systems.&amp;nbsp; What about Deception tools with deception networks?&amp;nbsp; &lt;A href="https://www.scmagazine.com/home/security-news/malware/next-generation-tools-deception-networks/?utm_source=newsletter&amp;amp;utm_medium=email&amp;amp;utm_campaign=SCUS_Newswire_20181220&amp;amp;hmSubId=ZK87kHs9IPI1&amp;amp;email_hash=e218d015fde22c2df6dc686cc6b0add0&amp;amp;mpweb=1325-4636-127726" target="_blank"&gt;https://www.scmagazine.com/home/security-news/malware/next-generation-tools-deception-networks/?utm_source=newsletter&amp;amp;utm_medium=email&amp;amp;utm_campaign=SCUS_Newswire_20181220&amp;amp;hmSubId=ZK87kHs9IPI1&amp;amp;email_hash=e218d015fde22c2df6dc686cc6b0add0&amp;amp;mpweb=1325-4636-127726&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Thu, 20 Dec 2018 21:03:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Deception-tools-Deception-Networks/m-p/17190#M725</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-12-20T21:03:49Z</dc:date>
    </item>
    <item>
      <title>Re: Deception tools:  Deception Networks</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Deception-tools-Deception-Networks/m-p/17202#M726</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for sharing. A good article about deception network to read.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Dec 2018 05:13:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Deception-tools-Deception-Networks/m-p/17202#M726</guid>
      <dc:creator>Johnson</dc:creator>
      <dc:date>2018-12-21T05:13:53Z</dc:date>
    </item>
    <item>
      <title>Re: Deception tools:  Deception Networks</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Deception-tools-Deception-Networks/m-p/17209#M727</link>
      <description>&lt;P&gt;I'd also like to share the following article:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Deception: Honey vs. Real Environments&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.darkreading.com/perimeter/deception-honey-vs-real-environments-/a/d-id/1333464" target="_blank"&gt;https://www.darkreading.com/perimeter/deception-honey-vs-real-environments-/a/d-id/1333464&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have Gartner subscription, there are some articles and predictions about deception technology as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's definitely aim to resolve some challenges with traditional honeypot deployment. However, I have not seen any demo yet to determine if the product is mature enough. Perhaps someone on the forum can share their experience?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Dec 2018 15:17:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Deception-tools-Deception-Networks/m-p/17209#M727</guid>
      <dc:creator>sergeling</dc:creator>
      <dc:date>2018-12-21T15:17:41Z</dc:date>
    </item>
    <item>
      <title>Re: Deception tools:  Deception Networks</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Deception-tools-Deception-Networks/m-p/17219#M730</link>
      <description>&lt;P&gt;If you want to get past simple honeypots, have you looked at Cymmetria?&amp;nbsp; That's the only commercial outfit I know of in the serious deception space ...&lt;/P&gt;</description>
      <pubDate>Fri, 21 Dec 2018 20:26:31 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Deception-tools-Deception-Networks/m-p/17219#M730</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2018-12-21T20:26:31Z</dc:date>
    </item>
  </channel>
</rss>

