
Sticky Traps for Attackers: How Modern Honeypots Work
Explore how honeypots function, their types, and innovations enhancing their effectiveness against cyber threats.
Topic
Data security / DLP / Know-how protectionNetwork Security / Patch ManagementSIEM / Threat Analytics / SOC
When & Where
Details
Format:
Technology lecture
Session description
In this lecture, we dive deep into the world of honeypots and explore their role in cybersecurity. We begin by addressing the fundamental question: What are honeypots? We'll discuss their function, the various types, and the sometimes significant design differences. Next, we look at our current honeypots and the valuable data they provide. Finally, we introduce our plans for the next generation of honeypots and demonstrate how they can be more effective in combating cyber attacks through enhanced features and innovative approaches.
Moderator
