Deploying Honeypots to Gather Actionable Threat Intelligence

Threat intelligence seems to be all the rage. There are tons of security vendors selling threat intelligence and products to support data collection and analysis, but what about localized actionable intelligence? This analysis will revisit the implementation of high-interaction honeypots in a production setting and how (if properly deployed) this data can be used to respond to incoming threats as they arise.

Provided by: SecurityTube.net Topic: Security Date Added: Jun 2015 Format: Webcast

Find By Topic