Using Deception to Hunt Cyber Attackers
From the report, “Today, there are a great many detection (identification and tracking) tools. However, there is not enough emphasis on trapping, resulting in a lack of effective trapping tools and techniques.
(more available)
Added: