In order to see where attacks targeting industrial control systems were coming from, ThreatStream, a Google Ventures-backed security startup, set up a decoy network to lure in attackers. The Honeypot was successful, but the data on attack sources were not especially surprising. Most of the attacks were traced back to the United States but other countries included Russia, China, the Netherlands and Germany.
How useful is Honeypot data?
Listen to our latest security slice podcast and hear Tim Erlin, Tyler Reguly, Lamar Bailey and Craig Young discuss why it’s easy for hackers to attack from foreign IP addresses, the rise of commercial Honeypot services and when enterprises should invest in a Honeypot program for their organization.
CLICK HERE TO LISTEN TO THE PODCAST
- Security Slice: Point-of-Sale System Shock
- Security Slice: Apple’s Core Security Values
- Security Slice: Why POS Malware Won’t BackOff
- Security Slice: Cybersecurity Hits the Road
Check out Tripwire SecureScan™, a free, cloud-based vulnerability management service for up to 100 Internet Protocol (IP) addresses on internal networks. This new tool makes vulnerability management easily accessible to small and medium-sized businesses that may not have the resources for enterprise-grade security technology – and it detects the Shellshock and Heartbleed vulnerabilities.
The Executive’s Guide to the Top 20 Critical Security Controls
Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].
Title image courtesy of ShutterStock