No honeypot? Don't bother calling yourself a security pro
Source: InfoWorld - Posted by Anthony Pell   
Intrusion Detection Deploy one of these honeypots and you'll soon find out who's attacking you -- and devise a strong defense to fight back. I'm constantly amazed by how many companies don't bother running honeypots, despite evidence that they're incredibly high-value, low-noise defense assets. A honeypot is a computer software or device that exists simply to be attacked. You can take any computer -- typically one you're getting ready to decommission because it's old and underpowered -- and use it as a honeypot. Because it's no longer a legitimate production asset, no person or service should be connecting to it. When something (such as a hacker or malware) connects to it, the honeypot sends an alert that can trigger an immediate incident response.

Read this full article at InfoWorld

Only registered users can write comments.
Please login or register.

Powered by AkoComment!