Tripwire to Host Webcast on Improving Security with Honeypots
Security leader to provide practical advice on effective use of decoy systems
PORTLAND, Ore. — September 23, 2014 — Tripwire, Inc., a global provider of advanced threat, security and compliance solutions, announced a new webcast titled, “Hacking Back: Proactive Threat Intelligence with Honeypots for Active Defense,” to take place Thursday, September 25, 2014, at 2:00 p.m. EDT/11:00 a.m. PDT.
As cybercriminals become more sophisticated and persistent in their attack strategies, static methods of threat intelligence are rapidly becoming obsolete. Dynamic threat intelligence can be obtained through the use of honeypots, ‘decoy’ systems designed to attract cyberattackers for the purpose of surveillance. Integrating critical information gleaned from honeypots with other threat intelligence and security automation tools makes it possible to understand attackers’ motives and objectives. This integration can be instrumental in the formulation of effective mitigation strategies for specific attack vectors. However, maintaining honeypots can be expensive and resource intensive.
Ioannis Koniaris, information security engineer and developer of HoneyDrive, and Ken Westin, security analyst at Tripwire, will provide an in-depth look at practical honeypot tools and techniques. The webcast will also cover how to use honeypot intelligence to improve security.
Webcast attendees will learn:
- How to use honeypots as effective intelligence tools.
- The differences between open-source honeypot tools.
- How honeypot data can be used to make security analytics more effective.
To register for the webcast, or for additional information, please visit: http://info.tripwire.com/webcast-register-hacking-back-proactive-threat-intelligence-with-honeypots.html.
Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence. Learn more at www.tripwire.com, get security news, trends and insights at http://www.tripwire.com/state-of-security/ or follow us on Twitter @TripwireInc.