Page 53 - Cyber Warnings
P. 53
Share the Honey But Don’t Get Stung
Sleuthing can be dangerous work. The key to a successful honeypot is that hackers never
realize they’ve encountered a honeypot.
While MHN is a community-based project, it employs a strict management hierarchy that
evaluates code, contributions, sensors and trust relationships, to protect the reliability of MHN
data.
And remember, the intelligence gathered through MHN is only as good as far as it is
disseminated. Users are not required to share the data they collect; many honeypots are
deployed in sensitive environments.
But the platform enables users to manage and share threat indicators, with the goal of
crowdsourcing data to increase cybersecurity protections. As one user finds information relevant
to their vertical, they can push it into the platform and share it with a larger community.
Honeypots have not received wide adoption as an enterprise defense largely because the
deployment and management has been a complicated process reserved for security companies
and security researchers.
Now with MHN, cybersecurity professionals have access to an enterprise-ready honeypot
management system, which enables organizations to create a fully functional, active-defense
network in minutes. It’s pretty sweet.
NOTE: To learn more about The Modern Honey Network, visit ThreatStream’s website.
ThreatStream’s honeypot software is open source and is available for free to cybersecurity
specialists.
53 Cyber Warnings E-Magazine – March 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide