In order to see where attacks targeting industrial control systems were coming from, ThreatStream, a Google Ventures-backed security startup, set up a decoy network to lure in attackers. The Honeypot was successful, but the data on attack sources were not especially surprising. Most of the attacks were traced back to the United States but other countries included Russia, China, the Netherlands and Germany.
How useful is Honeypot data?
Listen to our latest security slice podcast and hear Tim Erlin, Tyler Reguly, Lamar Bailey and Craig Young discuss why it’s easy for hackers to attack from foreign IP addresses, the rise of commercial Honeypot services and when enterprises should invest in a Honeypot program for their organization.
CLICK HERE TO LISTEN TO THE PODCAST
- Security Slice: Point-of-Sale System Shock
- Security Slice: Apple’s Core Security Values
- Security Slice: Why POS Malware Won’t BackOff
- Security Slice: Cybersecurity Hits the Road
The Executive’s Guide to the Top 20 Critical Security Controls
Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].
Title image courtesy of ShutterStock