Deception and Forensics for the Next Generation – Part 7: Device Forensics in a Deception Environment
SecureWorld News
AUGUST 29, 2020
It is a challenge because the deception net is, or should be, configured to prevent access to the outside—including the internet, as well as local networks—by any code running inside the device. We need a better solution for this problem and, fortunately, we have one: device memory forensics is built into the deception net.
Let's personalize your content