Posted on
in Presentations
Honeypots are an effective way to lure attackers into delivering malware samples and showing tactics, techniques and procedures (TTPs). Let’s discuss the next steps to take with these systems: which protocol should we support (RDP, SCADA, web), ease of secure deployment, automation, multi-machine environments, interactivity (full vs. low) and increasing the collaboration with open or shared source.
Share With Your Community