Tag: Honeypots
Exposed Services Commonly Observed in Public Clouds
Cloud misconfigurations become one of the major reasons for unauthorized intrusions and accidental data breaches. Threat actors often target unsecured or poorly configured cloud...
“Attackers always look for and exploit trending topics”
CISO MAG met Shyam Sundar Ramaswami, Lead Security / Threat Researcher, Cisco, at the NULLCON event held in Goa, in February 2020. Ramaswami is...
Deception Tactics in Cybersecurity: Human Lab Rat
Deception has been a defense strategy in military and intelligence programs for hundreds of years. As cybersecurity techniques mature, we continue to borrow proven...
Honeypots: Best Bet for IoT Security?
Electronics manufacturer Panasonic recently described how it boosted its Internet of Things security by connecting them to internet honeypots. The company stated that it’s...