cheap nfl jerseys china cheap nfl jerseys free shipping wholesale nfl jerseys china wholesale jerseys from china cheap nfl jerseys free shipping cheap nfl jerseys for sale cheap jerseys free shipping wholesale nfl jerseys from china cheap nfl jerseys sale cheap nike nfl jerseys china wholesale jerseys free shipping cheap nfl jerseys wholesale wholesale nfl jerseys online cheap nfl jerseys wholesale china jerseys wholesale cheap coach handbags outlet authentic designer handbags cheap coach handbags outlet cheap coach purses outlet discount coach bags coach bags sale coach purse outlet cheap real coach purses coach handbags sale online coach purse outlet michael kors outlet online store cheap michael kors bags cheap michael kors purse michael kors factory outlet online cheap michael kors handbags cheap michael kors purses michael kors bags outlet online cheap michael kors purse michael kors handbags discount

Security leader to provide practical advice on effective use of decoy systems

PORTLAND, Ore. — September 23, 2014 Tripwire, Inc., a global provider of advanced threat,  security and compliance solutions, announced a new webcast titled, “Hacking Back: Proactive Threat Intelligence with Honeypots for Active Defense,” to take place Thursday, September 25, 2014, at 2:00 p.m. EDT/11:00 a.m. PDT.

As cybercriminals become more sophisticated and persistent in their attack strategies, static methods of threat intelligence are rapidly becoming obsolete. Dynamic threat intelligence can be obtained through the use of honeypots, ‘decoy’ systems designed to attract cyberattackers for the purpose of surveillance. Integrating critical information gleaned from honeypots with other threat intelligence and security automation tools makes it possible to understand attackers’ motives and objectives. This integration can be instrumental in the formulation of effective mitigation strategies for specific attack vectors. However, maintaining honeypots can be expensive and resource intensive.

Ioannis Koniaris, information security engineer and developer of HoneyDrive, and Ken Westin, security analyst at Tripwire, will provide an in-depth look at practical honeypot tools and techniques. The webcast will also cover how to use honeypot intelligence to improve security.

Webcast attendees will learn:

  • How to use honeypots as effective intelligence tools.
  • The differences between open-source honeypot tools.
  • How honeypot data can be used to make security analytics more effective.

To register for the webcast, or for additional information, please visit:

 About Tripwire

Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence.  Learn more at, get security news, trends and insights at or follow us on Twitter @TripwireInc.


Comments are closed.