article thumbnail

Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos

The Security Ledger

Niels Provos has a storied, two decade career on the forefront of cybersecurity, starting in the late 1990s with his work as a graduate student on phenomena like steganography and honeypots.

article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

or specialized tools to deliver obfuscation defenses such as: Honeypots: Provide tempting targets for attackers that contain no valid information as one of several similar deception technologies to trigger alerts for early attack detection. These techniques can use built-in software features (for firewalls, operating systems, etc.)

Security 104
article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

While I produced this episode, a 21 year old Massachusetts National Guard airman is alleged to have photographed and distributed copies of classified US Military material on Discord, a social media site. All those exercises, the honeypot or honeynet challenges I think that's what they were called in. Let's analyze stuff.

IT 40