Interesting commercial offering:
http://www.geektime.com/2016/01/04/israeli-topspin-whirls-up-a-7m-series-a-for-honeypot-cyber-security-solutions/
Interesting commercial offering:
http://www.geektime.com/2016/01/04/israeli-topspin-whirls-up-a-7m-series-a-for-honeypot-cyber-security-solutions/
Superb write up and overview of what honeypots can be used for and can provide (a little weak on the details, but then again this is a huge domain once you start to scratch the surface 🙂
http://archive.hack.lu/2015/Dr.Honeypots_Worskhop_Hack.lu2015_Rist_Arcas%20.pdf
Some interesting takes on an old topic: https://www.cerias.purdue.edu/site/deception/
Please check out this excellent write up by David Watson: http://www.honeynet.org/node/1267
Getting ready for the rapid emergence of the IoT space, the guys out of Japan are showing how relevant honeypots are: http://ipsr.ynu.ac.jp/iot/index.html#desctiption
Some new and interesting work building on an in-kernel module for high interaction honeypots: http://arxiv.org/pdf/1507.03117v1.pdf
An idea I’d also thought needed to reach production ready status, thankfully the folks at Cymmetria are promising the goods. The proof of a true ‘plug’n’play’ nature will only be evident once the technology can be rolled out, but the concept is great:
http://www.cymmetria.com/
http://techcrunch.com/2015/06/27/cymmetria/
14 days running a secret Dark Web pedophile honeypot (and why I now think Tor is the devil): http://geekslop.com/2015/catching-pedophiles-running-secret-dark-web-tor-honeypot
A nice breakdown of MHN and overview of what ThreatStream are up to: https://www.youtube.com/watch?v=Zd1Br8TW1mk
Nothing too exciting here, however with the industry clamoring for Big Data analysis and elastic search being a tool of choice for many, this could have real future implications.
http://jordan-wright.github.io/blog/2015/03/23/introducing-elastichoney-an-elasticsearch-honeypot/