Deception technology applied to pharma cybersecurity

June 28, 2018 Mayuri Kumar

Deception technology uses decoys, or traps, that mimic a network's actual IT assets. In its early days, deception technology required considerable manual labor and expertise to deploy, monitor and maintain. But, partly due to virtualization and automated deployment, the technology may be seeing renewed interest among healthcare organizations.

"We all know that there are a number of attacks that occur even in environments where they have multiple security controls deployed," said Mac McMillan, CEO, and president of CynergisTek, a cybersecurity, and information consulting firm.

TechTarget featured Mac McMillan's commentary in the article above.

Previous Article
MD Anderson Cancer Center Fined $4.3 M For Data Breach
MD Anderson Cancer Center Fined $4.3 M For Data Breach

Next Article
Cyber Crime: Print and Save This Article — You May Not Be Able to After Ransomware Strikes
Cyber Crime: Print and Save This Article — You May Not Be Able to After Ransomware Strikes

×

Subscribe to Our Monthly Cyber Bulletins with the Latest News, Tips and More!

First Name
Last Name
Company
Thank You!
Error - something went wrong!