Posted by: Kev Eley, Senior Director of Sales, EMEA –
My son is football mad (soccer mad to my American friends). The other day he showed me the 50 Craziest Football Skills Ever on Youtube (check it out) highlighting the skills of Pele, Ronaldo, Messi, Neymar to name but a a few. I marvelled at their skills as they performed trick after trick. Anyone who has ever watched a Premier League game will know how important tricking the opponent is … in a striker: defender 1 on 1 situation, a feint by a player can make all the difference in the balance of the game. When a striker takes a penalty, consider how many times they send the keeper the wrong way. Ever seen a winger faking a cross to wrong foot their opponents and send another player into the box? Deception plays out time and time again in any given football match. Step overs, rabona’s, nutmegs and false leans are all critical tactics employed by the very best – and the most talented – football professionals in the world. Which brings me to Deception in Cybersecurity. Malware traps, honey nets, spin data. All critical tactics that can trick your cyber adversary, wrong footing them so they can’t score a goal (metaphorically speaking)! Like their counterparts in football, my feeling is that the very best – and the most talented – information security practitioners in the world will routinely employ these deception tactics to defeat their cyber adversaries. In fact, I’m already seeing that happen. And when more info sec teams deploy deception, they’ll start winning more contests versus their cyber opponents. Now that’ll be a match worth watching!!