July 01, 2015
Industry analysts discuss steps to protect WLANs against honeypot APs and how Juniper's alliance with Ruckus could shake up the market.
Honeypots Get Started
Bring yourself up to speed with our introductory content
A virtual honeypot is software that emulates a vulnerable system or network to attract intruders and study their behavior. Virtual honeypots contrast with hardware-based honeypots, which are dedicated computers, networks or network segments designed to serve the same purpose. Virtual honeypots, as virtual machines, may exist in multiple configurations on a single computer or appliance to emulate various systems and vulnerabilities. Continue Reading
A Google hack honeypot is a system designed to be vulnerable to sophisticated search engine queries for the purpose of attracting hackers and studying their behavior. Google hacking (sometimes called Google dorking) is the use of advanced search operators to access hard-to-find information. Although Google hacking has many valid research purposes, it's also employed by attackers to gather information that can be used for illicit purposes, such as identity theft or corporate espionage. Continue Reading
Is your enterprise ready to derive top dollar from your data? Infonomics is the field that treats corporate information as a valuable asset, but how to properly assign that value is the million-dollar -- or is that billion-dollar? -- question for many CIOs. In this issue of CIO Decisions e-zine, SearchCIO Senior News Writer Nicole Laskowski examines how today's companies are using infonomics to their economic benefit and provides six steps for measuring the value of an organization's unique information assets.
Also in this issue, SearchCIO Executive Editor Linda Tucci talks to Dell CIO Andi Karaboutis about how she transformed her 5,000-person-strong IT department from an order taker to a business maker; we look at balancing the need for more data with the desire for clean data; and take a cautious look at the ways in which disruptive technologies affect the human condition. Continue Reading
Evaluate Honeypots Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Distributed decoy systems aim to take deception by defenders to the next level. Will a network of traps and lies change the rules of engagement? Continue Reading
Congressman Joe Kennedy looks at the threat of cyberwar and decides to muster a Massachusetts defense. Continue Reading
The founder of the Honeynet Project explains how honeypots work and how they complement other technologies. Continue Reading
Learn to apply best practices and optimize your operations.
Sometimes the best defense is a good offense. Expert Eric Cole explains the merits of offensive countermeasures in the enterprise. Continue Reading
Spoofing, diversion and obfuscation are all part of honeyd's powerful arsenal. Continue Reading
Problem Solve Honeypots Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Learn how malware sinkholing is helping security experts analyze infected devices and even disable malware in compromised endpoints. Continue Reading
Honeypots have long been used to track attackers' activity and defend against coming threats. In this tip, network security expert Anand Sastry describes the different types of honeypots and which is best for your enterprise. Continue Reading
Honeypots can provide a great deal of insight into an environment's attack activity. However, before implementing them, there are some significant issues that require careful consideration and planning. Continue Reading