
In a recent webinar, Stav Sitnikov, Chief Product Officer at Stream Security, and Tushar Kothari, Former CEO and Board Member of Attivo Networks, explored how organizations can turn the tables on cyber attackers using Stream Traps—deceptive cloud decoys designed to detect and delay malicious actors.
In a recent webinar, Stav Sitnikov, Chief Product Officer at Stream Security, and Tushar Kothari, Former CEO and Board Member of Attivo Networks, explored how organizations can turn the tables on cyber attackers using Stream Traps—deceptive cloud decoys designed to detect and delay malicious actors.
Here's our webinar summary that dives into how Stream Traps can be a part of a dynamic, real-time Cloud Detection & Response strategy
At the start of the webinar, Stav and Tushar introduced the concept of cloud traps, which have been a critical tool in cybersecurity for over a decade in on-prem. environments.
These deceptive assets are planted within an organization’s infrastructure to mislead attackers, tricking them into engaging with false targets instead of real, high-value assets. In on-prem. settings, however, deceptive assets came with high overhead and unsustainable maintenance. Unlike on-prem. environments, where decoys can be costly and complex to manage, cloud traps are easier to deploy, scale, and maintain.
Stav highlighted that cloud environments are dynamic and automated by design, making it possible to deploy traps without significant operational overhead.
“In on-prem., setting up traps often requires manual intervention and dedicated hardware, but in the cloud, we can automate and place traps strategically without adding extra burden,” he explained.
Tushar added, “Cloud decoys can be projected at scale without consuming real infrastructure resources. Attackers don’t know what’s real and what’s not, and in a vast cloud environment, that uncertainty works in our favor.”
Stav described the purpose of Stream Traps in two key aspects:
Traditional cybersecurity strategies aim to minimize mean time to response (MTTR), but Stav and Tushar argued in the webinar that slowing attackers down is just as important.
Cybercriminals are increasingly well-funded and trained in traditional security tools. However, deception disrupts their tactics and forces them to second-guess every move.
Tushar used an analogy to highlight the advantage of deception: “If you’re trying to catch a mouse in your house, the best method isn’t chasing it with a rifle—it’s placing a trap with some bait. This shifts the effort onto the attacker.”
Stream Traps are uniquely positioned to slow down and contain cyber threats. Once an attacker interacts with a traps, organizations have multiple options to neutralize the threat:
One of the most powerful deception techniques discussed was sandboxing. Stav and Tushar explained how attackers can be led into a controlled, isolated cloud environment where they unknowingly interact with fake data.
“The trap exists in the customer’s real environment," Stav explained, "but once the attacker engages with it, we can move them to a cloud account that we control. From their perspective, they’re still moving laterally—but in reality, they’re just wasting time.”
Most deception-based security solutions fail because they lack environmental awareness. Many existing canary solutions randomly deploy traps without understanding where attackers are most likely to strike.
“It's important to place decoys where attackers will naturally go, not just anywhere,” Stav noted. “The key is placing them as close as possible to the perimeter, where threats originate, so they act as early-warning beacons.”
Recommended cloud trap placement includes:
Stream. Security leverages AI to automate deception deployment, reducing the friction between security and DevOps teams.
“We use AI to scan your environment and identify where the riskiest places are,” Stav explained. “Then we generate decoys that match your environment, ensuring they look real enough to fool attackers.”
Stream’s AI deployment benefits include:
Traditional approaches rely on manual deployment, which often leads to delays and inconsistencies. Stream’s automation eliminates these inefficiencies.
Tushar explained how Stream Traps alleviate the burden of overwhelming security alerts, making life easier for security operations teams.
Stream Traps shift the balance of power from attackers to defenders by using deception to delay and expose threats. With Stream Traps, organizations can strategically and seamlessly deploy cloud decoys, reducing manual effort while increasing detection accuracy. By embedding Stream Traps into cloud environments, security teams gain a proactive, high-impact defense strategy that ensures attackers work against themselves while defenders stay ahead.
Want to watch the full webinar on Stream Traps with Stav and Tushar? Click here.
For more information on how your security team can integrate Stream Traps into your cloud security strategy, book a demo with our team.
Stream.Security delivers the only cloud detection and response solution that SecOps teams can trust. Born in the cloud, Stream’s Cloud Twin solution enables real-time cloud threat and exposure modeling to accelerate response in today’s highly dynamic cloud enterprise environments. By using the Stream Security platform, SecOps teams gain unparalleled visibility and can pinpoint exposures and threats by understanding the past, present, and future of their cloud infrastructure. The AI-assisted platform helps to determine attack paths and blast radius across all elements of the cloud infrastructure to eliminate gaps accelerate MTTR by streamlining investigations, reducing knowledge gaps while maximizing team productivity and limiting burnout.