Charleston ISSA Slides: Using Canary Honeypots for NSM

I recently spoke at a Charleston ISSA meeting about using honeypots as an effective part of an organization’s network security monitoring strategy. I devote an entire chapter to this in the Applied NSM book.

You can view the slides from this presentation here:

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.