Remove Communications Remove Education Remove Government Remove Honeypots
article thumbnail

The Hacker Mind Podcast: Incident Response in the Cloud

ForAllSecure

And I think the, you know, this is, you know, this is part of what we're about at Cato, I guess is is trying to educate the industry that, hey, actually, you can investigate, you can do forensics in the cloud. Are governments putting their resources online? CAMPBELL: Yeah, absolutely. This was a more traditional attack.

Cloud 40
article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

or specialized tools to deliver obfuscation defenses such as: Honeypots: Provide tempting targets for attackers that contain no valid information as one of several similar deception technologies to trigger alerts for early attack detection. Communication protocols (TCP, HTTPS, etc.): behind the proxy.

Security 120