You are reading it here first: A bank in India is looking to acquire a 'deception' infrastructure that will act as a fail-safe in case hackers try to access its valuable information. Telecommunication Consultants of India (TCIL) has floated the tender for an unnamed bank and the solution will be installed in its data centre. TCIL, in the tender, said that the deception solution should be able to provide decoy firewalls, decoy web application firewalls (WAF), decoy demilitarised zone (DMZ), and so on. According to SearchSecurity, computer networks, a DMZ, or demilitarized zone, is a physical or logical subnet that separates a local area network (LAN) from other untrusted networks. The tender said that the deception solution should support 4 stages of attack: Before the attack: Pre-emption. The deception solution should have the ability to monitor an organisation's attack surface. During the attack: Detection. The solution should be able to create and deploy authentic deceptions across all endpoints. After the attack: Response. The solution should collect forensic intelligence and the context needed to understand and act on an incident. Stop the attacker movement: Mitigation. For this stage, the tender said that the solution should be able to integrate into the existing security ecosystem and that it should provide in-depth logs to help Security Operations Center mitigate cyber security risks. How would it work? The decoys should be scientifically placed in multiple subnets, so the hackers will encounter them in the process of trying to find valuable information. When the hackers try to access the…
