Honeypots provide the best way I know of to detect attackers or unauthorized snoopers inside or outside your organization.
For decades I’ve wondered why honeypots weren’t taking off, but they finally seem to be reaching critical mass. I help a growing number of companies implement their first serious honeypots — and the number of vendors offering honeypot products, such as Canary or KFSensor, continues to grow.
If you’re considering a honeypot deployment, here are 10 decisions you’ll have to make.
To read this article in full or to leave a comment, please click here