Honeypots & Deceptive Solutions
0 seconds of 0 secondsVolume 90%
Press shift question mark to access a list of keyboard shortcuts
Keyboard Shortcuts
Shortcuts Open/Close/ or ?
Play/PauseSPACE
Increase Volume↑
Decrease Volume↓
Seek Forward→
Seek Backward←
Captions On/Offc
Fullscreen/Exit Fullscreenf
Mute/Unmutem
Decrease Caption Size-
Increase Caption Size+ or =
Seek %0-9

Apr 21st 2017
This Week in Enterprise Tech 236
Honeypots & Deceptive Solutions
F5 talking about deceptive solutions and honeypots.
Although the show is no longer in production, you can enjoy episodes from our archives.
Guests:
Ray Pompon
Ray Pompon, Principal Threat Researcher Evangelist, F5 Labs, will be participating and speaking to the topic of deceptive solutions and honeypots.
Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech.
Thanks to CacheFly for the bandwidth for this show.
Links
- Intel Optane SSD DC P4800X 375GB Review - Enterprise 3D XPoint
- Ethernet evolution: Broadcom switches offer Time Sensitive Ethernet
- MIT selling 8 million coveted IPv4 addresses; Amazon a buyer
- Classic Mac OS and dozens of apps can now be run in a browser window
- Riverbed slurps Xirrus to take SD-WAN all the way to Wi-Fi
- Rumor: Intel Will Launch Coffee Lake, Basin Falls Earlier Than Expected
- Underdog team wins millions in competition to make real-life tricorder
- Trump blows his deadline on anti-hacking plan
- WILL DECEPTION AS A DEFENSE BECOME MAINSTREAM?
- DNS IS STILL THE ACHILLES’ HEEL OF THE INTERNET
- DOXING, DOS, AND DEFACEMENT: TODAY’S MAINSTREAM HACKTIVISM TOOLS