article thumbnail

Q&A: How emulating attacks in a live environment can more pervasively protect complex networks

The Last Watchdog

We have customers within the financial services vertical that do this on a regular basis. DeSanto: So before people did the simulated event in a lab setting, tied to a performance test, and so they were doing it as a spot check. We’ve set up honeypots around the world, which we use to harvest and categorize malware.