Who here has implemented honeypot / honey net solutions? What has your experience been like?

4.7k viewscircle icon2 Upvotescircle icon3 Comments
Sort by:
Chief Security Officer in Software7 years ago

We use honey pots to generate our own threat intel about attacks on our company.

VP of Global IT and Cybersecurity in Manufacturing7 years ago

Traditional honeypot or honey net technology are still out there and used.

A new approach on the use of honeypots would be Deception Technology.

CEO|CIO7 years ago

Wow that is blast from our past, we used to to have one

Lightbulb on1

Content you might like

Chief Data/Analytics Officer28%

Chief Executive Officer18%

Chief Information Officer 46%

Chief Risk Officer18%

Chief Technology Officer30%

Chief Compliance Officer19%

Chief Operating Officer10%

Chief Human Resources Officer9%

General Counsel or Chief Legal Officer16%

Other (please share in the comments)2%

None

View Results

Reverse engineering15%

Application cloning31%

Code tampering46%

Intellectual property theft47%

API abuse37%

Cryptographic key exposure14%

Unsecure storage14%

Customer data exposure9%

View Results