• Skip to main content
  • Skip to secondary menu
  • Skip to footer

Cyber Security Market

Cyber Security Technologies & Markets

  • Cyber Security Events 2022-2023
  • Market Reports
  • Sponsored Post
  • Make a Contribution
  • About
  • Contact

Seven in Ten Cybersecurity Professionals Are Using or Considering Honey Pots, Deception Technology

May 17, 2019 By CybersecurityMarket.com

One in five companies are already using forensic investigations and other sophisticated methods to identify their attackers, like setting up honey pots and repositories of fake data to give attackers the idea they’ve hit real data while acting as a diversion tactic, according to the latest International Cyber Benchmark Index from the Neustar International Security Council (NISC).

Companies’ growing investment in advanced forensic capabilities that can help identify attackers in greater detail is increasingly eclipsing what most law-enforcement agencies are willing to devote. 72 percent of respondents said their organization either already uses or would use honey pots or deception technology. Furthermore, 71 percent of respondents would let hackers take the fake or booby-trapped document to gather counterintelligence – rather than shutting down an attack as soon as a bad actor engages with a deceptive file – in an effort to identify the thieves later or reveal information about the location, ownership and possible vulnerabilities of the hackers’ machines.

Based on bi-monthly survey responses from security professionals across EMEA and the United States, the unique Cyber Benchmark Index provides a robust measure of the state of cybersecurity across these regions that can be monitored over time. The latest survey reveals an increased perception of threats, with the index reaching a new high of 21.5 — up from 14.4 in March 2018 and 6.5 in May 2017, when NISC began mapping threat levels. The previous index, released in January, was at 19.4.

Asked to rank six cyber threats in order from greatest to least concern during January and February 2019, March survey respondents ranked DDoS attacks as the top concern, as in the previous survey, followed closely by system compromise and loss of intellectual property.

Just over half (51 percent) of respondents surveyed said their enterprise had been on the receiving end of a DDoS attack at some point in time, down from 52 percent last survey period (with a different sample composition) but still well above the 43 percent average for the full 11 rounds of the survey.

When asked whether the threat of various types of attacks had increased, stayed the same or decreased during the previous two months, respondents most frequently identified generalized phishing as a growing threat (52 percent), followed by targeted hacking and DDoS attacks (both 49 percent). The share of respondents indicating that a given threat had decreased did not exceed single digits for any of the 14 threats on the list.

In considering the origin of attacks, 62 percent saw increasing threats from the world at large, 55 percent saw increasing threats from their own country and 51 percent saw increasing threats from their industry. These figures are all higher than the overall survey averages (60, 50 and 45 percent, respectively).

“Security leaders increasingly feel that breaches are inevitable, and there is a growing appetite for advanced forensic tools that can deliver insights around attacker attribution and tactics in real-time,” said Rodney Joffe, Chairman of NISC and Neustar Senior Vice President and Fellow. “Whether they opt to use them like an alarm system, ejecting bad actors from the network upon contact with a honey pot or deceptive file, or for a more sophisticated counterintelligence operation that gathers vital information on attacker movements and methods, cybersecurity professionals want solutions that can provide better real-time awareness and understanding of the enemy.”

NISC Cyber Benchmark Index methodology

The International Cyber Benchmarks Index is based on a bimonthly online survey, conducted by Harris Interactive on behalf of NISC, of security professionals across EMEA and the United States. The March 2019 survey participants comprise 302 professionals from France, Germany, Italy, Spain, the United Kingdom and the United States. All survey respondents hold senior positions within their organizations (director of IT, network services manager, security consultant, CTO, etc.) and are able to provide informed opinions about cybersecurity issues and how these issues impact their enterprises and the wider business community.

The International Cyber Benchmarks Index figure is calculated using five of the survey questions that are repeated in every survey and tracked over time. An initial figure is taken from the percentage of enterprises that say notable recent cyber events have directly affected the way they protect their business. This figure is multiplied by the average “net increase” percentages from across three separate questions, reflecting (1) the change in the level of threat of attack by various vectors, (2) the change in the risk of attack from various actors and (3) the change in the threat landscape. This figure is then multiplied by the percentage of enterprises that have ever been on the receiving end of a DDoS attack.

About the Neustar International Security Council

The Neustar International Security Council is an elite group of select cybersecurity leaders across key industries and companies. Through face-to-face events including an annual summit, quarterly thought-leadership seminars and regional roundtables, members learn and share the latest trends from leading experts and peers. For more information, visit https://www.nisc.neustar/.

About Neustar, Inc.

Neustar, Inc., is a leading global information services provider driving the connected world forward with responsible identity resolution. As a company built on a foundation of Privacy by Design, Neustar is depended upon by the world’s largest corporations to help grow, guard and guide their businesses with the most complete understanding of how to connect people, places and things. Neustar’s unique, accurate and real-time identity system, continuously corroborated through billions of transactions, empowers critical decisions across our clients’ enterprise needs. More information is available at https://www.home.neustar.

Related

Filed Under: Cybersecurity Market

Footer

Recent Posts

  • A defense-in-depth approach is critical to reduce email risk
  • The Global Cyber Innovation Summit (GCIS), 27-28, 2022, Baltimore, Maryland
  • Hackers have broken into dozens of Russian institutions
  • The 13th Annual Billington CyberSecurity Summit, September 7-9, 2022, Washington Convention Center
  • Black Hat Announces Keynote Speakers for Black Hat Asia 2022 Hybrid Event, May 10–13 2022, Marina Bay Sands, Singapore
  • ISACA Conference North America 2022 hybrid event, 4-6 May 2022, New Orleans, LA
  • The third edition of the Barcelona Cybersecurity Congress (BCC), May 10-12, 2022, Barcelona
  • The Official Cyber Security Summit in Miami on April 7, 2022
  • Black Hat Europe 2021 Announces Keynote Speakers & Releases Full Event Schedule, November 8-11, 2021, ExCeL London
  • Cyber Cartels, Ransomware, AI, & Cryptocurrency Among Cyber Trends Explored at Billington Cybersecurity Summit, October 6-8, 2021

Media Partners

  • Opinion
  • Press Media Release
  • Briefly
  • OPINT
  • VPNW
  • S3H
  • Domain Aftermarkets

Media Partners

  • Technology Conferences
  • Event Sharing Network
  • Defense Conferences
  • Cybersecurity Events
  • Event Calendar
  • Calendarial
  • Domain Market Research

Copyright © 2015 CyberSecurityMarket.com

Technologies, Market Analysis & Market Research Reports

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT