Who here has implemented honeypot / honey net solutions? What has your experience been like?

4.7k viewscircle icon2 Upvotescircle icon3 Comments
Sort by:
Chief Security Officer in Software7 years ago

We use honey pots to generate our own threat intel about attacks on our company.

VP of Global IT and Cybersecurity in Manufacturing7 years ago

Traditional honeypot or honey net technology are still out there and used.

A new approach on the use of honeypots would be Deception Technology.

CEO|CIO7 years ago

Wow that is blast from our past, we used to to have one

Lightbulb on1

Content you might like

yes - I changed the Settings81%

no - I use the default18%

All users11%

Some users49%

A few users32%

No users5%

Unsure1%

View Results