Detecting Intruders with Honeytokens - Who Goes There?

Detecting Intruders with Honeytokens - Who Goes There?

Conf42 via YouTube Direct link

thanks, reach out!

22 of 22

22 of 22

thanks, reach out!

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Detecting Intruders with Honeytokens - Who Goes There?

Automatically move to the next video in the Classroom when playback concludes

  1. 1 intro
  2. 2 preamble
  3. 3 about dwayne
  4. 4 let's deploy something real quick
  5. 5 attackers want your credentials
  6. 6 uber breach - september 2022
  7. 7 astrazeneca - november 2022
  8. 8 circleci - january 2023
  9. 9 hardcoded credentials
  10. 10 we know how attackers behave
  11. 11 what attackers want
  12. 12 in the 2023 of the state of secrets sprawl
  13. 13 a brief history of cyber deception
  14. 14 what is a honeytoken?
  15. 15 honeytoken options
  16. 16 open source - the diy route
  17. 17 commercial options - off the shelf
  18. 18 honeytoken best practices
  19. 19 let's check on our honeytoken from earlier...
  20. 20 in conclusion
  21. 21 honeytoken options
  22. 22 thanks, reach out!

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.