Honeypots are an effective way to lure attackers into delivering malware samples and showing tactics, techniques and procedures (TTPs). Let’s discuss the next steps to take with these systems: which protocol should we support (RDP, SCADA, web), ease of secure deployment, automation, multi-machine environments, interactivity (full vs. low) and increasing the collaboration with open or shared source.
Hackers & Threats Analytics Intelligence & Response
threat intelligence practitioner perspectives anti-malware hackers & threats deception-based security
Share With Your Community