• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech Guide
  • Home Improvement
  • Gadget & Apps
  • Deals
  • News

Letting hackers inside a network to counter attacks, why not?

By Guest Authors

Existing methods of combating cyber threats are proving less and less effective as advanced persistent threats continue to outdo security tools and evade detection.

Security experts at Cuvepia believe it is practically impossible to stop hackers from gaining entrance into a network if they are to use APTs. So to address the growing problem of cyber threats, the computer security firm has come up with an unlikely security approach, but which it says could be effective in crushing cyber attackers: let the hackers in.

hackers

The premises of the recommendation are simple, yet make sense amid every failed attempt of even the most robust security providers to thwart cyber attacks. The idea is to set up a trap within the network so that attackers can be neutralized once they have gained access to the system.

This approach might prove rather more efficient than keeping the bad guys out of your network, which is again quite impossible to accomplish as even large corporations such as Sony and Anthem fall victims to malicious attacks.

The ineffectiveness of conventional security tools is nowhere more evident than in the recent cases of cyber attacks involving critical infrastructures. In most cases, it had taken long for the information security department to detect a compromise in the network – some months while in worst case scenarios years.

For example, in the case of the Anthem hack, investigators believe hackers have been hiding inside the network of the large healthcare insurance provider and scraping off huge volumes of data before the company learned of the attack.

Specifically, costly firewall systems are no longer capable of as much protecting our most sensitive data as they are meant to. Letting hackers in, instead, could enable the security department to set up a way to catch the bad actors once their behavior has been analyzed. This involves multiple layers of entrapment within the network to lure hackers into believing they are not being monitored or detected.

But putting that idea into action does not come without its share of challenges. First, the culture of businesses needs to be overhauled. Business executives must be convinced that the era of a digital protection for computers is longing for a complete makeover. That the conventional systems of isolating infected computers are not working any longer as they are originally designed to do. It was the common and dominant security approach in the 1990s. We are in the 21st century, things have changed. In other words, enterprises must treat security as an asset instead of liability and compliance requirement.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

Oleap Archer AI Meeting Headset Review: Smart Assistant or Redundant Tech?

SUNSEEKER ELITE X7 Robot Lawn Mower Review – Does Automated Lawn Care Work?

OptiSolex 400W Portable SolarBag Kit Review

Linkind Smart Solar Spotlight SL5C Review – Solar Smarts Done Right

Follow TechWalls

YoutubeFacebookXInstagram

Recent Posts

  • Water from dishwasher backing up in the kitchen sink – How To Fix It?
  • Stop Leaking On the Nut of BrassCraft Compression Valve
  • Oleap Archer AI Meeting Headset Review: Smart Assistant or Redundant Tech?
  • Father’s Day Gift Idea: garden pond waterfalls and fountains

Copyright © 2025 · All Rights Reserved