Skip to content ↓ | Skip to navigation ↓

In order to see where attacks targeting industrial control systems were coming from, ThreatStream, a Google Ventures-backed security startup, set up a decoy network to lure in attackers. The Honeypot was successful, but the data on attack sources were not especially surprising. Most of the attacks were traced back to the United States but other countries included Russia, China, the Netherlands and Germany.

How useful is Honeypot data?

Listen to our latest security slice podcast and hear Tim ErlinTyler Reguly, Lamar Bailey and Craig Young discuss why it’s easy for hackers to attack from foreign IP addresses, the rise of commercial Honeypot services and when enterprises should invest in a Honeypot program for their organization.






picCheck out Tripwire SecureScan™, a free, cloud-based vulnerability management service  for up to 100 Internet Protocol (IP) addresses on internal networks. This new tool makes vulnerability management easily accessible to small and medium-sized businesses that may not have the resources for enterprise-grade security technology – and it detects the Shellshock and Heartbleed vulnerabilities.

picThe Executive’s Guide to the Top 20 Critical Security Controls

Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].

Title image courtesy of ShutterStock

Tripwire University