1) MicroSolved provides cybersecurity services including vulnerability assessments, penetration testing, risk assessments, and detection solutions to help organizations minimize risks from cyber threats.
2) Cyber attacks are increasingly targeting devices with IP addresses, and many mobile device users do not use security software leaving them vulnerable. Web applications are also a major target of attacks.
3) MicroSolved's HoneyPoint Security Server solution uses decoy servers to detect suspicious internal and external activity, helping security teams investigate potential security incidents.
Embracing Threat Intelligence and Finding ROI in Your DecisionCylance
Answering the question of what threat intelligence is compared to threat data. Is it better to build or buy a solution? Who benefits? Steve presents on how to get started and what you'll need to do to best protect your organization against malicious attackers.
By Steve Mancini, Senior Director of Security, Cylance
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Lancope, Inc.
Learn about the key mistakes organizations are making when it comes to incident response, presented by the chairman and founder of the Ponemon Institute, Dr. Larry Ponemon, and Lancope’s director of security research, Tom Cross. Then learn about how the right mix of people, processes and technology can dramatically improve your incident response efforts and elevate the importance of the CSIRT within your organization.
Exploring the Capabilities and Economics of CybercrimeCylance
In this talk we will look at the current attacker community as well as the tactics and capabilities that are currently being leveraged against targets across the globe. We will then go into the financial mechanics behind both financial based cybercrime as well as nationstate espionage. We will touch on some of the scary capabilities of attackers and try to work thru the reason why we still aren’t seeing the broad scale destructive attacks that everyone has been predicting for years.
By Jim Walter, Senior Research Scientist, Cylance
Five Reasons to Look Beyond Math-based Next-Gen AntivirusSarah Vanier
In this SlideShare, we discuss why the industry’s most hyped math-based prevention product, developed with ‘predictive mathematics’, ‘machine learning’ and ‘artificial intelligence’ is an approach that will not come close to solving your overall endpoint protection challenges.
Embracing Threat Intelligence and Finding ROI in Your DecisionCylance
Answering the question of what threat intelligence is compared to threat data. Is it better to build or buy a solution? Who benefits? Steve presents on how to get started and what you'll need to do to best protect your organization against malicious attackers.
By Steve Mancini, Senior Director of Security, Cylance
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Lancope, Inc.
Learn about the key mistakes organizations are making when it comes to incident response, presented by the chairman and founder of the Ponemon Institute, Dr. Larry Ponemon, and Lancope’s director of security research, Tom Cross. Then learn about how the right mix of people, processes and technology can dramatically improve your incident response efforts and elevate the importance of the CSIRT within your organization.
Exploring the Capabilities and Economics of CybercrimeCylance
In this talk we will look at the current attacker community as well as the tactics and capabilities that are currently being leveraged against targets across the globe. We will then go into the financial mechanics behind both financial based cybercrime as well as nationstate espionage. We will touch on some of the scary capabilities of attackers and try to work thru the reason why we still aren’t seeing the broad scale destructive attacks that everyone has been predicting for years.
By Jim Walter, Senior Research Scientist, Cylance
Five Reasons to Look Beyond Math-based Next-Gen AntivirusSarah Vanier
In this SlideShare, we discuss why the industry’s most hyped math-based prevention product, developed with ‘predictive mathematics’, ‘machine learning’ and ‘artificial intelligence’ is an approach that will not come close to solving your overall endpoint protection challenges.
Alien vault sans cyber threat intelligenceAlienVault
Over the last several years, we have seen that attackers are innovating much faster than defenders are. This trend is steering many companies to look towards cyber threat intelligence (CTI) to help them navigate today’s threatening landscape. SANS conducted a survey this year to explore who is using cyber threat intelligence and how they are using it. The survey collected responses from 326 IT professionals working in a variety of industries, in all sizes and from many different regions. 69% of the respondents reported implementing CTI to some extent, with only 16% planning not to pursue CTI in their environments. Which side of this percentage do you fall into? The infographic below provides some of the key questions to ask when getting started with threat intelligence, along with data from the SANS survey to show you how others are using threat intelligence.
Make IR Effective with Risk Evaluation and ReportingPriyanka Aash
Today, determining risk of a cyberattack is the generic vulnerability or malware rating ignoring aspects of how the business is impacted. Understanding the vulnerability state of the network, reputational risk, business loss, cost of IR and reconstitution cost are rarely understood. This presentation will show a data-driven approach to IR prioritizing response based on risk and business impact.
(Source: RSA USA 2016-San Francisco)
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationPriyanka Aash
This session will present a real case study of methodology and advanced cybersecurity tools used along with important tips and lessons learned on implementing an ISOC project at the second largest city of the nation. Topics include the critical success factors, advanced tools and technologies for ISOC, Situational Awareness, Threat Intelligence Sharing and cybersecurity collaboration.
(Source: RSA USA 2016-San Francisco)
This is a presentation discussing recommendations for a secure connection between a remote data center and a primary data center; taking into account user connectivity and end-user security awareness training.
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...Resilient Systems
Industrial Control Systems (ICS) refer to various types of technology that control physical infrastructure ranging from industrial production - like valves in a manufacturing plant, to environment controls - like lighting and cooling systems in an office building. Think you don't have ICS on your network? Think again. Data centers, offices and corporate campuses rely on Industrial Control Systems to operate. In fact, virtually every modern building, and corporate campus around the world plays host to environmental controls, building entry systems, safety systems, and many other automation systems that are considered ICS.
As with any system, ICS have known vulnerabilities, which now that they are network-accessible represent a tantalizing target for attackers. Why bother trying to defeat carefully constructed network security measures if you can more easily turn on the sprinkler system and bring down the entire data center?
This webinar will review ICS basics and then detail their various security risks. It will also recommend general do's and don'ts when dealing with ICS. Our featured speakers for this timely webinar are:
- Billy Rios, Technical Director at Cylance.
Billy is seasoned security professional whose background spans both the military and the private sector. He is a noted expert in ICS security.
-Ted Julian, Chief Marketing Officer at Co3 Systems.
Ted is a serial entrepreneur who has launched four companies during his ~20 years in the security / compliance industry.
According to Cisco’s 2018 Cyber security automation Study, organizations overwhelmingly favor specialized tools to get the most robust capabilities across their environment. The more disparate technology a SOC uses, the greater the need for security orchestration and automation platform to help tie everything together.
Visit - https://www.siemplify.co/
As presented at this year's RSA Conference, a 2016 survey of critical infrastructure companies and officials demonstrates that this scenario could be reality. Jay and Julia will take you through the spine-chilling specifics of why the nation's critical infrastructure is at an ever increased risk of cyber attacks as hackers make them their prime target.
The Incident Response Playbook for Android and iOSPriyanka Aash
What is your mobile device incident response plan? If you cannot answer that question, you should attend this session. The session will cover the challenges in mobile, how and why it is different from traditional incident response, and the building blocks you can use to craft your own mobile incident response plan.
(Source: RSA USA 2016-San Francisco)
The Missing Approach is a way to reduce the effort, cost, and time it takes to detect cyber threats and security risks. Benefits for companies of all sizes.
Think preventing cyberattacks is enough to protect your enterprise? Consider this: 52% of organizations expect to be compromised by a security breach this year, at an average cost of $3.79 million.
Better get proactive about strengthening your incident response capabilities. Start by taking a look at our infographic, chock-full of amazing statistics about:
• The size and scope of today’s successful cyberattacks
• A better approach to incident response
• Specific solutions and technologies that cut your risk and cost
Blue Coat Infographic: Proactive Incident response Meriann Muraoka
You can keep worrying about being the next victim of a cyberattack. Or you can get proactive about incident response—and turn the fear into stronger security at a lower cost.
Vulnerability Management Nirvana - Seattle Agora - 18Mar16Kymberlee Price
Vulnerability Management Nirvana: A Study in Predicting Exploitability
When everything is a priority, nothing is. 15% or 10,000 vulnerabilities have a CVSS score of 10. Vendors and practitioners alike use CVSS or their own threat intelligence models to predict which vulnerabilities will be exploited next. We review current options, present a predictive data-driven prioritization model, and how attendees can get started using our approach in their vulnerability management program.
Cyber crime is big business, and organizations continue to search for effective strategies and technologies to protect themselves and their sensitive data from criminals. Threat intelligence is increasingly viewed as a valuable addition for defenders. To tell this story, we’ve organized some intriguing statistics about the current threat landscape. We answer questions like “What motivates cyber criminals?” and “Why do organizations struggle to detect cyber attacks?” Ultimately, you’ll understand why applying threat intelligence can play a crucial role in detecting and mitigating emerging cyber risks before your business is impacted.
Mobile Developer's Guide To The Galaxy, 15th editionMarco Tabor
The independent, free handbook about mobile technologies. Published since 2009, this 15th edition has released in February 2015. On 272 pages more than 20 experts from the mobile community explain how to get started as an app developer or app provider. You learn about app concept design, prototyping, native app development, cross-platform approaches, mobile analytics, accessibility, monetisation and a lot more.
This is a non-profit project from the Bremen-based German app agency Enough Software.
Alien vault sans cyber threat intelligenceAlienVault
Over the last several years, we have seen that attackers are innovating much faster than defenders are. This trend is steering many companies to look towards cyber threat intelligence (CTI) to help them navigate today’s threatening landscape. SANS conducted a survey this year to explore who is using cyber threat intelligence and how they are using it. The survey collected responses from 326 IT professionals working in a variety of industries, in all sizes and from many different regions. 69% of the respondents reported implementing CTI to some extent, with only 16% planning not to pursue CTI in their environments. Which side of this percentage do you fall into? The infographic below provides some of the key questions to ask when getting started with threat intelligence, along with data from the SANS survey to show you how others are using threat intelligence.
Make IR Effective with Risk Evaluation and ReportingPriyanka Aash
Today, determining risk of a cyberattack is the generic vulnerability or malware rating ignoring aspects of how the business is impacted. Understanding the vulnerability state of the network, reputational risk, business loss, cost of IR and reconstitution cost are rarely understood. This presentation will show a data-driven approach to IR prioritizing response based on risk and business impact.
(Source: RSA USA 2016-San Francisco)
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationPriyanka Aash
This session will present a real case study of methodology and advanced cybersecurity tools used along with important tips and lessons learned on implementing an ISOC project at the second largest city of the nation. Topics include the critical success factors, advanced tools and technologies for ISOC, Situational Awareness, Threat Intelligence Sharing and cybersecurity collaboration.
(Source: RSA USA 2016-San Francisco)
This is a presentation discussing recommendations for a secure connection between a remote data center and a primary data center; taking into account user connectivity and end-user security awareness training.
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...Resilient Systems
Industrial Control Systems (ICS) refer to various types of technology that control physical infrastructure ranging from industrial production - like valves in a manufacturing plant, to environment controls - like lighting and cooling systems in an office building. Think you don't have ICS on your network? Think again. Data centers, offices and corporate campuses rely on Industrial Control Systems to operate. In fact, virtually every modern building, and corporate campus around the world plays host to environmental controls, building entry systems, safety systems, and many other automation systems that are considered ICS.
As with any system, ICS have known vulnerabilities, which now that they are network-accessible represent a tantalizing target for attackers. Why bother trying to defeat carefully constructed network security measures if you can more easily turn on the sprinkler system and bring down the entire data center?
This webinar will review ICS basics and then detail their various security risks. It will also recommend general do's and don'ts when dealing with ICS. Our featured speakers for this timely webinar are:
- Billy Rios, Technical Director at Cylance.
Billy is seasoned security professional whose background spans both the military and the private sector. He is a noted expert in ICS security.
-Ted Julian, Chief Marketing Officer at Co3 Systems.
Ted is a serial entrepreneur who has launched four companies during his ~20 years in the security / compliance industry.
According to Cisco’s 2018 Cyber security automation Study, organizations overwhelmingly favor specialized tools to get the most robust capabilities across their environment. The more disparate technology a SOC uses, the greater the need for security orchestration and automation platform to help tie everything together.
Visit - https://www.siemplify.co/
As presented at this year's RSA Conference, a 2016 survey of critical infrastructure companies and officials demonstrates that this scenario could be reality. Jay and Julia will take you through the spine-chilling specifics of why the nation's critical infrastructure is at an ever increased risk of cyber attacks as hackers make them their prime target.
The Incident Response Playbook for Android and iOSPriyanka Aash
What is your mobile device incident response plan? If you cannot answer that question, you should attend this session. The session will cover the challenges in mobile, how and why it is different from traditional incident response, and the building blocks you can use to craft your own mobile incident response plan.
(Source: RSA USA 2016-San Francisco)
The Missing Approach is a way to reduce the effort, cost, and time it takes to detect cyber threats and security risks. Benefits for companies of all sizes.
Think preventing cyberattacks is enough to protect your enterprise? Consider this: 52% of organizations expect to be compromised by a security breach this year, at an average cost of $3.79 million.
Better get proactive about strengthening your incident response capabilities. Start by taking a look at our infographic, chock-full of amazing statistics about:
• The size and scope of today’s successful cyberattacks
• A better approach to incident response
• Specific solutions and technologies that cut your risk and cost
Blue Coat Infographic: Proactive Incident response Meriann Muraoka
You can keep worrying about being the next victim of a cyberattack. Or you can get proactive about incident response—and turn the fear into stronger security at a lower cost.
Vulnerability Management Nirvana - Seattle Agora - 18Mar16Kymberlee Price
Vulnerability Management Nirvana: A Study in Predicting Exploitability
When everything is a priority, nothing is. 15% or 10,000 vulnerabilities have a CVSS score of 10. Vendors and practitioners alike use CVSS or their own threat intelligence models to predict which vulnerabilities will be exploited next. We review current options, present a predictive data-driven prioritization model, and how attendees can get started using our approach in their vulnerability management program.
Cyber crime is big business, and organizations continue to search for effective strategies and technologies to protect themselves and their sensitive data from criminals. Threat intelligence is increasingly viewed as a valuable addition for defenders. To tell this story, we’ve organized some intriguing statistics about the current threat landscape. We answer questions like “What motivates cyber criminals?” and “Why do organizations struggle to detect cyber attacks?” Ultimately, you’ll understand why applying threat intelligence can play a crucial role in detecting and mitigating emerging cyber risks before your business is impacted.
Mobile Developer's Guide To The Galaxy, 15th editionMarco Tabor
The independent, free handbook about mobile technologies. Published since 2009, this 15th edition has released in February 2015. On 272 pages more than 20 experts from the mobile community explain how to get started as an app developer or app provider. You learn about app concept design, prototyping, native app development, cross-platform approaches, mobile analytics, accessibility, monetisation and a lot more.
This is a non-profit project from the Bremen-based German app agency Enough Software.
Mobile Developer's Guide To The Galaxy Vol.7Marco Tabor
The 7th edition of the Mobile Developer´s Guide To the Galaxy has been presented on the Mobile World Congress 2011. On 160 pages, it gives an updated overview on mobile technologies, the differences between the numerous mobile platforms and possible development approaches. The new edition contains new chapters about app development for BlackBerry, about cross-platform development and about how to create accessible mobile software.
It is an open project hosted and coordinated by the German product and service provider Enough Software. Currently 17 experts from the mobile ecosystem contributed their know how, everyone is invited to join.
Send your feedback and input directly to: developers@enough.de
Developers Guide To The Galaxy 8th editionMarco Tabor
Completely updated and extended edition of this non-commercial overview on mobile technologies and development approaches. Helpful for developers and decision makers without technical background.
Mobile Developer's Guide To The Galaxy No.10Marco Tabor
The community-driven, non-commercial, free handbook about mobile technologies. Learn everything about the differences between the platforms, cross-platform approaches and key topics like how to implement NFC, security or haptics in mobile apps.
If you want the book as a hardcopy or want to get involved as a writer or sponsor, write to developers@enough.de
Mobile Developer's Guide To The Galaxy No. 9Marco Tabor
This non-commercial brochure by the German company Enough Software (www.enough.de) provides an overview on the different mobile technologies and platforms. Almost 20 writers contributed their know-how and outline their views on the pros and cons of different operation systems and development approaches. Together with the Wireless Industry Partnership (WIP), we started this project in 2009. The current 9th edition has been presented in October 2011 and consists of 170 pages.
Please send your feedback and input directly to developers@enough.de
Use the same address if your company would like to sponsor upcoming editions.
In case you would like to get hardcopies of the guide, we will be happy to send them over to you. You would just need to pay us the postage and packaging.
Mobile Developer's Guide To The Galaxy 12th EditionMarco Tabor
The latest edition of the popular free book about mobile technologies, aimed at developers and decision makers alike.
Over 20 experts from the mobile community introduce you to topics like app prototyping, developing Android/ iOS/ Java ME/ BlackBerry and Windows Phone apps, cross-platform development, mobile app analytics, accessibility in mobile apps, LBS, augmented reality, app monetization, app stores and a lot more.
This book has been distributed on barcamps, conferences, industry events and at universities worldwide- over 50,000 hardcopies have been printed until today. It's probably the most up-to-date publication you will find.
Mobile Developers Guide To The Galaxy Vol.6Marco Tabor
The latest updated edition of Enough Software`s Guide to mobile platforms. Useful for application developers as well as for decision makers wanting to enter the mobile market.
Mobile Developer's Guide To The Galaxy, 14th EditionMarco Tabor
The latest edition of the community-driven handbook on mobile technologies. 256 pages packed with everything you need to know to start your mobile business: Which platforms exist and what's their potential? What about cross-platform app development? How do I create an app concept that works? How do I implement location-based services, NFC, mobile analytics, augmented reality or media content? What do I need to know about accessibility, monetization, security and app testing?
20 experts share their know-how in this book and you are invited to join them! See www.enough.de/mdgg for details.
We are a new generation IT Software Company, helping our customers to optimize their IT investments, while preparing them for the best-in-class operating model, for delivering that “competitive edge” in their marketplace.
Presentacion realizada en Argentina y Paraguay Durante Marzo 2014.
En Argentina por Faustino Sanchez. En Paraguay por Santiago Cavanna.
Trata sobre el problema de la presencia de vulnerabilidades en aplicaciones, el impacto que tiene en las organizaciones y la forma que se encuentra disponible para descubrirlas en forma temprana y facilitar su remediacion
Links disponibles en
http://www.santiagocavanna.com/segurinfo-2014-el-costo-oculto-de-las-aplicaciones-vulnerables/
COVID-19 free penetration tests by Pentest-Tools.comPentest-Tools.com
We offered companies free penetration tests so they could improve their security and better cope with the emerging cyberattacks.
The report covers top security issues we found and experts' recommendations to avoid attacks that disrupt businesses.
"Cybercriminals are more aggressive and technically proficient - they are professional, industrialized with well-defined organizational structures" "It’s now more than ever IT security professionals, businesses, agencies, and authorities need to collaborate and function as a unified force, exchanging resources, information, and intelligence to reduce the threat of Cybercriminal activities."
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
Hundreds of companies, and the most demanding Federal agencies rely on DMI for Mobile Security services and solutions. And with more than 500,000 devices under management, we know how to do it right.
Now we’ve distilled 9 years of Mobile Security best practices into a white paper you can download. The paper lays out a smart, sensible approach to managing mobile risk without unnecessary cost and business disruption.
Please be our guest and check out the white paper. You’ll learn:
How to identify and protect against the threats that matter the most
What to do about “the hottest new technologies”
How to get the most protection for the least cost and disruption
The key differences and similarities between Mobile and traditional cybersecurity
- See more at: http://dminc.com/solutions/enterprise-mobility-services/mobilesecuritywp/#sthash.yTptNZRw.dpuf
Looking to understand how hackers and other attackers use cyber technology to attack your network and your executives? This slide set provides an overview and details the anatomy of a cyber attack, and the strategies you can use to manage and mitigate risk.
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
According to the latest research from cyber security firm, Kamino, 45% of financial advisers had experienced a cyber incident last year.
Julian Plummer, founder of Kamino, delves into why cyber security is a very real issue for financial advisers and their clients, and the types of cyber incidents that are impacting the financial planning industry. He also provides easy to implement measures to help you improve the cyber security of your practice.
Internet, Cyber-attacks and threats are becoming more prevalent. This Infographic explains the current state, and things to consider for yourself and your business.
The impact of a security breach on MSP's and their clientsJose Lopez
This solution brief outline the financial and reputation impact of a security breach for a MSP and his customers. Choosing the best Antivirus/Antimalware and content control solution for a MSP is critical for protect his customers properly against new and emerging threats.
Endpoints are everywhere, and endpoint security is evolving. Endpoints also remain the most attractive target for hackers as a point of entry for attacks because they’re connected to the weakest link in enterprise data protection: humans.
View the SlideShare to learn:
--Why evolving threats require increased endpoint defense capabilities.
--What organizations can do to protect against known and unknown threats, while reducing manual processes for administrators.
--The primary capabilities of endpoint detection and response (EDR) tools, and how you can find the right fit for your business.
--Where your organization sits on the endpoint security maturity scale.
--Keys to maturing your endpoint security strategy.
A new generation of products and services is helping organizations keep pace with modern threats and advance beyond traditional, prevention-oriented endpoint protection to a more comprehensive — and realistic — focus on detection and incident response.
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfEnterprise Insider
According to the 2022 Ponemon Cost of Insider Threats Global Report, insider threat occurrences surged 44% in the last two years, with expenses per incident climbing by more than a third to $15.38 million.
3. Get MicroSolved
The average computer response in 2007 for identity loss was
$197 per identity. Our technicians stop the leaks in their
tracks.
The average loss per phishing victim jumped from $257 in
2005 to $1,244 in 2006.
--Gartner Inc., November 2006
1 in 3 workers jot down their computer password,
undermining their security.
--Nucleus Research and KnowledgeStorm, November 2006
4.
5. Vulnerability Assessment
We examine and test web-based applications for mission
critical and highly sensitive data processing consumer-facing
portals and critical infrastructure management systems.
Our lab process is regularly utilized by Information Security
Magazine for product reviews, comparisons and testing.
We have reviewed binary and source code for hundreds of
applications using our industry-leading methodologies.
6.
7. Have IP Address, Hack IP Address
Hackers target anything with an IP address, such as
routers, printers, network-attached storage units,
wireless access points and backup appliances. Their
motto is simple: have IP address, hack IP address.
Network World 11/1/07
8.
9. Penetration Testing
We have identified new vulnerabilities, performed testing and
validation of new technologies and been an information
security resource for organizations ranging in size from small
business to some members of the Global 100.
10.
11. Penetration Testing - Alive and Well
A penetration test cannot be expected to identify all possible
security vulnerabilities, nor does it offer any guarantee that an
organization’s information is secure. But it is still a valuable tool
in determining where an organization has security holes.
- Brent Huston, CEO, MicroSolved, Inc.
12.
13. Risk Assessment
We identify the threats your organization’s success and assess
the probabilities and potential costs of the threats
materializing.
We help you learn from past mistakes by using a variety of
statistical and analytical tools to examine past projects,
determine where mistakes were made, and devise methods to
avoid repeating them.
14.
15. Minimize Risk
With 55% of all attacks causing financial damage originating
internally, it makes sense to change your focus to internal
prevention, detection and response. By combining
HoneyPoint Security Server and an appropriate log monitoring
tool, you can greatly simplify deployments, reduce costs and
increase abilities to focus on the security events that matter.
- Brent Huston, CEO, MicroSolved, Inc.
16.
17. Detection for Prevention
Detection of attackers in your environment is critical. But the
way you go about it has to make sense from both a security
and manageability standpoint. There is a way forward. That
way is to change the way you think about information security.
MicroSolved can help your organization do just that.
- Brent Huston, CEO, MicroSolved, Inc.
18.
19. Application/Device Security
According to a recent McAfee survey 79 percent of mobile
device users don't use any antivirus or other security software
on devices at all while 15 percent said they were unsure if their
device had security software.
“It’s unanimous. Web application security is the #1 avenue of
attack according to basically every industry data security
report available.” - Jeremiah Grossman, Chief Technology
Officer of WhiteHat Security
20.
21. HoneyPoint Security Server
The HoneyPoint strategy is simple, yet powerfully effective.
HoneyPoints are flexible pseudo-server applications that are
able to emulate thousands of real services such as web,
email, and database systems. Since these pseudo-services
are not real applications, there is no reason for anyone to
interact with them in any way. Thus, once deployed, any
activity to a HoneyPoint is, by default, suspicious.
- Brent Huston, CEO, MicroSolved, Inc.
22.
23. HoneyPoint to the Rescue!
Internally, most clients experience 3-4 events per month
on average. These events are usually treated very
seriously, since any HoneyPoint traffic internally is
suspicious at best and malicious at worst. Most security
teams leveraging HoneyPoint use these events as
triggers for true security incidents. They launch full
investigations and either mitigate or minimize the
discovered issues.