Offensive cyber is generally not endorsed by law enforcement or security professionals. But deception technologies can offer an intriguing alternative: automating the creation, deployment, and management of digital traps, lures and deceits that blend among existing IT resources.
Hidden in plain sight, these tools are intended to engage and prompt the attacker into revealing their trade craft, tools and techniques, in real-time, which provides the enterprise security teams with the facts to pre-emptively launch effective counter measures.