<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Tom Ofek Rytt</title>
    <description>The latest articles on DEV Community by Tom Ofek Rytt (@tomrytt).</description>
    <link>https://dev.to/tomrytt</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F201036%2F76acaad4-43aa-4497-b577-9026939e524e.png</url>
      <title>DEV Community: Tom Ofek Rytt</title>
      <link>https://dev.to/tomrytt</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/tomrytt"/>
    <language>en</language>
    <item>
      <title>Benefits of an AI-based Automated Transcription</title>
      <dc:creator>Tom Ofek Rytt</dc:creator>
      <pubDate>Wed, 28 Aug 2019 19:52:30 +0000</pubDate>
      <link>https://dev.to/tomrytt/benefits-of-an-ai-based-automated-transcription-2i1a</link>
      <guid>https://dev.to/tomrytt/benefits-of-an-ai-based-automated-transcription-2i1a</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--GAn9jZ5v--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.pixabay.com/photo/2019/08/19/20/18/artificial-intelligence-4417279_960_720.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--GAn9jZ5v--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.pixabay.com/photo/2019/08/19/20/18/artificial-intelligence-4417279_960_720.jpg" alt="" width="880" height="587"&gt;&lt;/a&gt;&lt;br&gt;Image source: &lt;a href="https://pixabay.com/illustrations/artificial-intelligence-robot-ai-ki-4417279/"&gt;Pixabay&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;Transcription has been with us for a long time, but the industry has changed dramatically in the last decade. This is due to advancements in technology, which have subsequently led to the emergence of AI-driven transcription apps such as &lt;a href="https://trint.com/"&gt;Trint&lt;/a&gt;, &lt;a href="https://www.fastcompany.com/40570158/theres-no-perfect-transcription-app-but-otter-is-getting-there"&gt;Otter&lt;/a&gt;, and &lt;a href="https://transcribe.wreally.com/"&gt;Wreally&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Since automated transcripts are machine-generated, they are quick to accommodate and can deliver in an hour or maybe even less for short files. This puts &lt;a href="https://cloudinary.com/blog/with_automatic_video_subtitles_silence_speaks_volumes"&gt;automated video subtitles&lt;/a&gt; and transcription services at a huge advantage against human transcription – where it could take a couple of days to convert a video recording into a transcribed document.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Is Transcription?
&lt;/h2&gt;

&lt;p&gt;Transcription is the process of translating speech into readable text. Transcriptions may be created from online videos, as well as podcasts, films, webinars, interviews, news footage, and speeches. It can take a large amount of time to transcribe something especially if you are doing it manually.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why You Should Transcribe Your Videos
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Improved Accessibility
&lt;/h3&gt;

&lt;p&gt;Transcription is one of the best ways to enable hearing-impaired people to access and understand your video content. Video transcription also makes it easier to translate videos into other languages. Users who speak another language can read a transcript in their preferred language, instead of watching the video.&lt;/p&gt;

&lt;h3&gt;
  
  
  Improved User Experience and Understanding
&lt;/h3&gt;

&lt;p&gt;Transcription allows consuming video content without the use of audio in a sound-sensitive environment. Transcription also lets users skim the content before watching the video. It can also help website visitors find the right video by searching for a keyword used within the video. &lt;/p&gt;

&lt;h3&gt;
  
  
  Improved Product Value
&lt;/h3&gt;

&lt;p&gt;Video transcripts can help increase the revenue of a paid product, such as a paid-access webinar. The transcription can be included as part of the main product, or present it as an add-on option for an additional fee.&lt;/p&gt;

&lt;h3&gt;
  
  
  Multiple Use Cases
&lt;/h3&gt;

&lt;p&gt;A high-quality video transcript can be shared on other mediums or used to create other types of content such as blog posts, eBooks, emails and more. A transcript may also help you create additional videos that elaborate or answer questions about the first video.&lt;/p&gt;

&lt;h2&gt;
  
  
  What are the Different Kinds of Transcription?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Manual transcription
&lt;/h3&gt;

&lt;p&gt;The most traditional form of transcription is manual transcription. Manual transcription involves listening to audio or video files and then typing the words into a document. Many people choose this option because there is no associated cost. The cost equates to much an individual values their time.&lt;/p&gt;

&lt;h3&gt;
  
  
  Transcriptionist or Video Transcription Services
&lt;/h3&gt;

&lt;p&gt;Creating your own online video transcript or using software may cost less, but it takes time, and accuracy isn’t guaranteed. Hiring a transcriptionist or online video transcription service may provide the most value and convenience. Transcription services use technology to convert speech to text. This kind of service is secure, offers high accuracy, and provides a quick turnaround.&lt;/p&gt;

&lt;h3&gt;
  
  
  Automated Transcription
&lt;/h3&gt;

&lt;p&gt;This process is significantly faster than transcribing manually. Automated transcription involves the conversion of video content as a whole and automatically produces electronic text at a lesser cost and with quick turn-around time.&lt;/p&gt;

&lt;h2&gt;
  
  
  Automated Transcription Benefits
&lt;/h2&gt;

&lt;p&gt;Automated transcription has come a long way in the last few years. Let’s look at some key benefits of automated transcription.&lt;/p&gt;

&lt;p&gt;Manual transcription can take hours or even days, automated transcription can be completed in minutes. &lt;br&gt;
Automated transcription is secure. Transcription is done entirely by machines and no human can ever see the audio or video file, nor the transcript&lt;/p&gt;

&lt;p&gt;Automated transcription is relatively inexpensive. Traditional transcription services can cost anywhere from $60 to $100 per hour of audio or video, automated transcription costs much less.&lt;br&gt;
With really clear, crisp audio, the accuracy of the transcript can be upwards of 95-98%.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Makes Automated Transcription Possible?
&lt;/h2&gt;

&lt;p&gt;Automated transcription is possible because of artificial intelligence and natural language processing. Each file and every sound is analyzed and interpreted using artificial intelligence and natural language processing.&lt;/p&gt;

&lt;p&gt;Automated technology is then used to match sounds to words to derive accurate transcripts. Some technologies support different languages and varying English accents.&lt;/p&gt;

&lt;p&gt;The market for AI-based transcription is split between large startups, who are each approaching the market differently. Larger players tend to offer speech-to-text as an API, as part of a larger product, or as an enterprise-level offering. Startups, on the other hand, are exploring business models to sell transcription software as a service directly to consumers and small businesses.&lt;/p&gt;

&lt;p&gt;Some companies, acknowledge the limited abilities of computers today, offer hybrid human and AI transcription services, or tools that let the user manually “polish” the transcription if it’s taken from a recording.&lt;/p&gt;

&lt;p&gt;While a few companies focus specifically on one subset of users like medical transcription, most are casting a wide net and either offering general-purpose software or several different products for different market segments. &lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;We are several years away from error-free automated transcription, but the technology continues to improve day after day. As more and more people turn to automated transcription, more voice data is collected and analyzed. The result is improved speech-to-text algorithms and more accurate transcripts.&lt;/p&gt;

&lt;p&gt;In the meantime, there are many ways to get the most out of automated transcription in its current state. Most of that requires users to capture high-quality audio and video. Reducing background noise, multiple speakers talking over each other, and swallowed words can greatly increase the accuracy of the automated transcription.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>6 Best Practices for Successful SIEM Implementation </title>
      <dc:creator>Tom Ofek Rytt</dc:creator>
      <pubDate>Tue, 06 Aug 2019 08:54:26 +0000</pubDate>
      <link>https://dev.to/tomrytt/6-best-practices-for-successful-siem-implementation-46dk</link>
      <guid>https://dev.to/tomrytt/6-best-practices-for-successful-siem-implementation-46dk</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--SVbiWnSE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://images.pexels.com/photos/258063/pexels-photo-258063.jpeg%3Fauto%3Dcompress%26cs%3Dtinysrgb%26dpr%3D2%26h%3D750%26w%3D1260" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--SVbiWnSE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://images.pexels.com/photos/258063/pexels-photo-258063.jpeg%3Fauto%3Dcompress%26cs%3Dtinysrgb%26dpr%3D2%26h%3D750%26w%3D1260" alt="" width="880" height="657"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Security Information and Event Management (SIEM)  is a powerful cybersecurity tool that protects organizations against threats and incidents. After reading this post, you will understand what is SIEM, how it can benefit the security of your organization and what are the best steps and practices to successfully implement SIEM.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Is SIEM?
&lt;/h2&gt;

&lt;p&gt;Security Information and Event Management (SIEM) is a cyber security solution that uses a set of rules and statistical correlations to turn even and log entries from security systems into actionable intel. Security teams can use the information provided by SIEM to detect threats in real-time, manage incident response efforts, investigate past events and form audits for compliance purposes.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why You Should Use SIEM?
&lt;/h3&gt;

&lt;p&gt;Security Operations Center (SOC) staff can use the data provided by SIEM on real-time and historical events to identify irregularities, vulnerabilities and incidents and establish better security protocols and focus mitigation efforts. &lt;/p&gt;

&lt;h3&gt;
  
  
  SIEM has a number of benefits for the SOC:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;**Data clustering—clusters data from various sources such as from databases, applications, network, security, servers and other systems like Anti-Virus (AV) and firewalls.&lt;/li&gt;
&lt;li&gt;**Correlation—creates meaningful bundles of event-related data to represent security threats, incidents, vulnerabilities and forensic results.&lt;/li&gt;
&lt;li&gt;**Automated alerts—analyses events to alert SOC staff on urgent problems via different kinds of messaging options, emails or security dashboards.&lt;/li&gt;
&lt;li&gt;**Compliance—gathers compliance data automatically to produce meaningful reports according to security governance and auditing procedures for industry standards.&lt;/li&gt;
&lt;li&gt;**Threat hunting—allows SOC staff to use SIEM data and uncover vulnerabilities and threats by running various queries.&lt;/li&gt;
&lt;li&gt;**Automation and integration—allows SOC staff to determine and execute automated workflow and playbooks in response to certain incidents and integrate with other security tools via Application Programming Interfaces (APIs). &lt;/li&gt;
&lt;li&gt;**Threat intelligence —incorporates intelligence feeds that contain actionable data on vulnerabilities, threat actors and attack patterns with internal information.&lt;/li&gt;
&lt;li&gt;**Improve Incident Response (IR)—delivers case management and allows SOC teams to collaborate and share security incident knowledge to quickly synchronize critical information and respond to threats efficiently.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For a comprehensive guide on how SIEM works and how it benefits the SOC, read this &lt;a href="https://www.exabeam.com/siem-guide/"&gt;SIEM guide&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  How to Successfully Deploy SIEM In Four Steps
&lt;/h2&gt;

&lt;p&gt;Four phases of successful SIEM deployment plan:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Phase #1: Discovering and planning&lt;/strong&gt;&lt;br&gt;
Start by reviewing the status of your organizational security to evaluate the most critical fronts your SIEM should be implemented. You should also determine what is crucial and necessary in terms of mandatory compliance, policies and best practices to ensure environmental security while taking into account the organizational policy. &lt;/p&gt;

&lt;p&gt;Since SIEM often discovers new security vulnerabilities, you should prioritize smaller subsets of the current policies and devices where the SIEM can be integrated and gather data to determine how to modify the system and apply the solution on a larger scale.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Phase #2: Piloting and implementation&lt;/strong&gt;&lt;br&gt;
To determine the goals of your SIEM project and the implementation course, you need to consider two goals:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Demonstrating the security capabilities of SIEM that will yield the best Return Of Investment (ROI).&lt;/li&gt;
&lt;li&gt; Preparing an operational model that will be used as a baseline and a runbook.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Test what you have discovered in the discovery and planning phase in real-time to expand the list of tools and incorporate them into other technologies. When you reach satisfactory results, use the information to further develop the system in the next phases.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Phase #3: Controlled deployment&lt;/strong&gt;&lt;br&gt;
The focus of this phase is to allow the organization to orchestrate full deployment by deploying a workflow with detailed approaches. This phase is also a useful test run of the initial production and the completed operational runbooks required for full deployment management.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Phase #4: Continuous Growth&lt;/strong&gt;&lt;br&gt;
A never-ending phase to ensure that the system keeps on improving over-time. You should always roll out new updates and expand deployment of your SIEM system to gather more actionable intel and incorporate new practices to improve your security and meet current policies. &lt;/p&gt;

&lt;h2&gt;
  
  
  Six Best Practices for Successful SIEM Implementation
&lt;/h2&gt;

&lt;p&gt;The efficiency of your SIEM solution depends on how you implement it. Incorporate these practices for a more secure organizational environment:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;#1. Planning implementation&lt;/strong&gt;&lt;br&gt;
First of all, you need to determine what services and security features you are looking for in a SIEM solution. Based on these requirements, you need to use policy-based rules to define which logs and activities your SIEM should monitor and use compare this policy against external compliance requirements to determine your needs. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;#2. Conducting test runs&lt;/strong&gt;&lt;br&gt;
Test running various scenarios, such as simulating an attack on the network, can help you assess the reaction and value of your SIEM. For example, you can check how quickly the software detected the threat and how long it took to send alerts to relevant team members. repeating this process multiple times and simulating various scenarios can help you tweak and fine-tune your SIEM.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;#3. Tuning correlation rules&lt;/strong&gt;&lt;br&gt;
SIEM relies on information to be efficient. By applying &lt;a href="https://www.solarwindsmsp.com/blog/siem-correlation-rules"&gt;correlation rules&lt;/a&gt;, it can detect events and threats that would be more difficult to identify in isolation. While most SIEM software already comes with pre-defined correlation rules, tweaking the correlation rules to best suit your needs is ensures it fits your needs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;#4. Identify compliance requirements&lt;/strong&gt;&lt;br&gt;
SIEM software can help organizations meet compliance requirements and regulations. However, these requirements can often overlap. To avoid this scenario, you can draft documents that specify the compliance requirements you need to meet and check that list against potential SIEM solutions to ensure they cover your needs. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;#5. Monitor access to network fronts and critical Resources&lt;/strong&gt;&lt;br&gt;
Some resources are more valuable than others. Ensure that your SIEM tool is monitoring the most valuable resources for your organization including suspicious user activity, systems, and unauthorized access. Additionally, make sure that your SIEM monitors and covers networks fronts that could be vulnerable to attacks such as routers, ports, wireless access and firewalls.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;#6. Prepare an Incident Response Plan (IRP)&lt;/strong&gt;&lt;br&gt;
SIEM solutions can detect and alert on threats, but it is up to your teams to respond and mitigate these threats. The moments after a threat has been detected are the most critical and can prevent incidents from escalating. Planning an efficient &lt;a href="https://www.cisco.com/c/en/us/products/security/incident-response-plan.html"&gt;incident response plan&lt;/a&gt; can help your security teams reduce stress and confusion in these crucial moments and provide a more focused and efficient mitigation effort. &lt;/p&gt;

&lt;h2&gt;
  
  
  Wrap Up
&lt;/h2&gt;

&lt;p&gt;With the vast quantity and variety of security data that needs to be collected, it has become practically impossible for security teams to manage alerts and threat intelligence manually. While SIEM is an important tool for processing all this information, you need to implement a number of practices and take advantage of additional tools in order to make the most of it.The steps detailed in this guide should help you ensure a successful SIEM implementation in your organization.&lt;/p&gt;

</description>
      <category>security</category>
    </item>
    <item>
      <title>Deception Technology as a Strategy for Cyber Security</title>
      <dc:creator>Tom Ofek Rytt</dc:creator>
      <pubDate>Tue, 30 Jul 2019 20:40:53 +0000</pubDate>
      <link>https://dev.to/tomrytt/deception-technology-as-a-strategy-for-cyber-security-57ch</link>
      <guid>https://dev.to/tomrytt/deception-technology-as-a-strategy-for-cyber-security-57ch</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--KJXprf3c--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/vq7cv43ju4ejw60a67m7.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--KJXprf3c--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://thepracticaldev.s3.amazonaws.com/i/vq7cv43ju4ejw60a67m7.jpg" alt="" width="880" height="660"&gt;&lt;/a&gt;&lt;br&gt;Image by Lasse Vestegård from &lt;a href="https://www.flickr.com/photos/66344850@N06/8521048643/in/photolist-dYYATM-TmA3Yz-au4WEg-TDqs9w-o5w8po-dKbo4o-nN992S-dRwKAN-7JyBAh-4mtSuS-j9DSBG-ocs1rG-JqGtbv-9cqRmE-Qqz7Dp-UihfV5-rAMiyL-GddT-FiQDh-2epnLKN-WjupGV-27wtiaB-dTGFkH-7opsco-rgGsF4-QsCfZa-hUZ1eh-XEwTRw-ajJMzN-6y1okX-7SPKCt-auhFAi-oMjPkx-oq2de-bM8LpV-eocjsR-WioDrs-xETwyL-DpUB7q-MzqLeZ-27cuqLR-6rXMdV-axsEXK-h8Tza9-4H2SrZ-25L9s3M-pK4p9V-DpUH2G-9gb7bj-2fuaVv6"&gt;Flickr&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;Nowadays, preventing security events from occurring is an uphill battle. The industry of cybersecurity to keep up with the commonality and intensity of cyber-attacks and data breaches. Additionally, some reports estimate that the lack of cybersecurity experts will only grow bigger and lead to a global crisis. This situation leads many security experts to come up with unique ways to combat cyber attacks.&lt;/p&gt;

&lt;p&gt;One of the cybersecurity methods invented by these efforts is deception technology, which aims to change the balance of power between security teams and cybercriminals. Read this article to learn what is deception technology, what are the benefits of deception, and why your organization should implement it as part of the cybersecurity strategy.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Is Deception Technology?
&lt;/h2&gt;

&lt;p&gt;Deception technology is a security method designed to lure bad actors that have infiltrated the network into traps and expose themselves before they can inflict significant damage. The concept of deception technology originated with the honey pot technique, which is used by sites to attract people with malicious intent and identify them. &lt;/p&gt;

&lt;p&gt;For deception technology to work, it needs to look genuine and mimic legitimate asses across the entire infrastructure. These decoys can also run in a real or virtual Operating System (OS).&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Use Deception Technology?
&lt;/h2&gt;

&lt;p&gt;Organizations use deception technology by placing a decoy in their network such as masking directories and files to seem like they hold high value to the organizations. When attackers try to access these decoys, they trigger the trap and the system alerts security teams across the organization that the organizational network has been breached and they are called into action. &lt;/p&gt;

&lt;p&gt;Deception technology allows security teams to fight cyber attackers in their own game and employ techniques that are different from most traditional cybersecurity efforts and provides an early and accurate detection method.&lt;/p&gt;

&lt;p&gt;Reasons to use deception technology include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Quick breach detection&lt;/strong&gt;—gives attackers false impression that they have the edge and drops their guard. When they try to cease their advantage, the trap is activated and all their activities are recorded and security teams alerted and can begin mitigating the threat. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Reducing false positives and provides automation&lt;/strong&gt;—reduces the number of false positives generated by the systems and delivers useful alerts that are triggered under specific activities and events. Additionally, the system automatically generates alerts and replaces a hands-on approach to breach detection.  Thus, making security less exhausted from chasing false positives and more focused and useful during true events.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Scaling and automation&lt;/strong&gt;—placing more decoys on new files and directories is easy, which makes deception technology highly scalable and allows you to fit into organizations of all sizes and grow according to need. Additionally, deception technology can be implemented in all types of organizational environments including on-premise, cloud and hybrid.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Detection Capabilities of Deception Systems
&lt;/h2&gt;

&lt;p&gt;Deception threat technology is capable of detecting a wide variety of threats without relying on known signatures, pattern detection and database lookups:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Geo-fencing&lt;/strong&gt;—tracks and locates the attacker of the attempted to steal specific deception files. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Man-in-the-middle (MITM) attacks&lt;/strong&gt;—protects against events where an attacker intercepts and possibly modify communication between two parties without their knowledge.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Lateral movement&lt;/strong&gt;—detects when attackers try to move throughout different parts of your networks to gain more access and information. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Credential theft&lt;/strong&gt;—recognizes when bad actors attempt to steal username and passwords.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Tracking stolen files&lt;/strong&gt;—plants tracking software in stolen files and detects and send alerts and location information when attackers try to access the files even after they have downloaded them to their systems.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Deception Technology Vendors&lt;br&gt;
Here is a list of several of the top providers of deception technology solutions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Acalvio&lt;/strong&gt;—provides Advanced Threat Defense (ATD) &lt;a href="https://www.acalvio.com/?source=post_page---------------------------"&gt;solution&lt;/a&gt; to detect, engage and respond to malicious activity inside the network. increases the security capabilities of Development, Security and operations (DevSecOps) personnel with ease of deployment, management and monitoring.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cynet&lt;/strong&gt;—offers a &lt;a href="https://www.cynet.com/platform/threat-protection/deception/"&gt;deception technology solution&lt;/a&gt; that supports various types of decoys to detect threats in various stages of the attack’s lifecycle. Cynet cyber deception provides preconfigured decoy files and allows you to craft your own files to best fit your requirements and system.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Illusive Network&lt;/strong&gt;—a group of ex-Israeli military intelligence, which offers &lt;a href="https://www.illusivenetworks.com/solutions-and-services/industries/technology/#requestademo"&gt;deception technology solution for high-tech&lt;/a&gt; that detects attempts to disrupt and tamper with systems and empowers defenders to be more productive. &lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Deception Technology Strategy
&lt;/h2&gt;

&lt;p&gt;The scale of deception technology must fit the requirements of the enterprise in which it is deployed. Consequently, the architecture of deception systems must be versatile enough to scale up and down with demand. Additionally, it needs to offer various decoy options to accommodate different technologies and environments. &lt;/p&gt;

&lt;p&gt;After the system is activated and managed to catch threats, use the next stages to ensure you make the most out of your deception technology:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;System profile&lt;/strong&gt;—analyze the deception system to identify what vulnerabilities were exploited and which tools or malware were used to launch the attack.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attacker profile&lt;/strong&gt;—analyze the deception system data to learn how the attackers infiltrated the system.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack analysis&lt;/strong&gt;—study the attack and incorporate the lessons you learned to patch the security holes.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Threat hunting&lt;/strong&gt;—let your security analysts use playbooks and security alerts to hunt down the threat.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Benefits of Deception Technology
&lt;/h2&gt;

&lt;p&gt;Deception adds an important defense layer that no other form of security does and offers many benefits for organizations:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Post-breach damage reduction&lt;/strong&gt;—detects threats after relatively low dwell time to reduce damage potential and quicken remediation efforts. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;High-fidelity alerts&lt;/strong&gt;—simplifies  and accelerates incident response and reduces fatigue caused by false positives.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Visibility&lt;/strong&gt;—grants visibility into device, system, and network modifications to reduce risk of credential theft and other forms of access abuse.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Versatility&lt;/strong&gt;—not being reliant on knowing signatures, patterns, and attack vectors allow deception to be more adaptable and useful against advanced threats.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Deployment automation&lt;/strong&gt;—allows you to automatically deploy additional decoys around critical assets or make the areas you suspect to be susceptible to attacks more complex.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Wrap Up
&lt;/h2&gt;

&lt;p&gt;Now that you understand the importance and value of deception technology, you are ready to start forming your own deception strategy and lay traps to protect your network from attacks. You can leverage the capabilities of technologies like honeypots and advanced analytics to not only stop threat actors in their tracks but also discover their location and attack methods. Sometimes, it’s better to fight fire with fire.&lt;/p&gt;

</description>
      <category>security</category>
    </item>
  </channel>
</rss>
