| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Threat Intelligence seems to be all the rage. There are tons of security vendors selling threat intelligence and products to support data collection and analysis, but what about localized actionable intelligence? This analysis will revisit the implementation of high-interaction honeypots in a production setting and how (iff properly deployed) this data can be used to respond to incoming threats as they arise. This talk will discuss the do?s and don?ts of integrating honeypots into your environment and how to obtain critical (actionable) insight from honeypot activity using open source tools. Bio: James Taliento is a Security Researcher primarily focused on security efficacy (a fancy word for offensive security research). As the founder of and Chief Research Officer at Cynical Security he spends most of his time overtaking networks and analyzing attack data. He?s consulted with Fortune 100?s in a variety of industries, and thoroughly enjoys designing creative ways to use honeypots. When James isn?t damaging his eyesight by staring at his laptop for hours on end, he could be found enjoying a good beer, engaging in some nonsensical DIY project, or laughing at inappropriate things on the internet.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast