Deception technology applied to pharma cybersecurity

June 28, 2018 Mayuri Kumar

Deception technology uses decoys, or traps, that mimic a network's actual IT assets. In its early days, deception technology required considerable manual labor and expertise to deploy, monitor and maintain. But, partly due to virtualization and automated deployment, the technology may be seeing renewed interest among healthcare organizations.

"We all know that there are a number of attacks that occur even in environments where they have multiple security controls deployed," said Mac McMillan, CEO, and president of CynergisTek, a cybersecurity, and information consulting firm.

TechTarget featured Mac McMillan's commentary in the article above.

Previous Article
  WannaCry, Petya 1 year later: The good, the bad and the ugly
WannaCry, Petya 1 year later: The good, the bad and the ugly

Next Article
Cyber Crime: Print and Save This Article — You May Not Be Able to After Ransomware Strikes
Cyber Crime: Print and Save This Article — You May Not Be Able to After Ransomware Strikes