RealNews

Dynamic Honeypots

For the past eight months we have been discussing what honeypots are, their value, their different types, and how they can be used and deployed. Today we will do something a little different. Instead of discussing what honeypots can do and how they work, we will take a look into the crystal ball and see what honeypots should do, how they could work. If I had a dream honeypot, this is what I would like to see in the future: the dynamic honeypot. The problem: One of the biggest challenges we face with most security technologies, including honeypots, is configuring them. Everything from encryption keys to firewall rules require a human to analyze the problem, come up with a solution, then configure and implement that solution. Adding more complexity, the work is not done once the technology is implemented. Once you have that ‘bad boy’ deployed, it can require daily loving care. I can remember starting my security career working in web farms that had over thirty firewalls, each firewall with hundreds of rules. A large part of my every day was spent updating and troubleshooting those rules. Full Story

OODA Analyst

OODA Analyst

OODA is comprised of a unique team of international experts capable of providing advanced intelligence and analysis, strategy and planning support, risk and threat management, training, decision support, crisis response, and security services to global corporations and governments.