Completed
let's check on our honeytoken from earlier...
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Detecting Intruders with Honeytokens - Who Goes There?
Automatically move to the next video in the Classroom when playback concludes
- 1 intro
- 2 preamble
- 3 about dwayne
- 4 let's deploy something real quick
- 5 attackers want your credentials
- 6 uber breach - september 2022
- 7 astrazeneca - november 2022
- 8 circleci - january 2023
- 9 hardcoded credentials
- 10 we know how attackers behave
- 11 what attackers want
- 12 in the 2023 of the state of secrets sprawl
- 13 a brief history of cyber deception
- 14 what is a honeytoken?
- 15 honeytoken options
- 16 open source - the diy route
- 17 commercial options - off the shelf
- 18 honeytoken best practices
- 19 let's check on our honeytoken from earlier...
- 20 in conclusion
- 21 honeytoken options
- 22 thanks, reach out!