Low-Cost Honeypots as Enterprise Defense Mechanism

Since the launch of Fred Cohens’ Deception Toolkit in 1998 (First publically released Honeypot), Honeypots has been a proven useful method for attack detection and analysis. As these honeypots are complex in installation and require high maintenance, they are yet to get their proper place in enterprise security suits. However, the honeypot technology has been… Continue reading

Digital Forensics and Incident Response (DFIR) using Docker

With the increasing popularity of container virtualization technology Now it has become imperative for forensics professionals to implement “Docker” technology in Digital Forensics and Incident Response operations to reduce a headache reconfiguring set up every time for different cases and increase productivity, One aspect of the using Docker for DFIR operations is providing Docker images… Continue reading