Cybersecurity › Network Security
Honeypots
18 ControlsHoneypots & Honeynets
Use deception technology to detect and analyze attack methods.
- Deploy low-interaction honeypots on unused IP addresses
- Any traffic to a honeypot is inherently suspicious — alert immediately
- Use canary tokens in documents, credentials, and DNS
- Feed honeypot intelligence into threat hunting workflows