GitGuardian invites you to their event

Trapping attackers with Honeytokens

About this event

Learn to create Honeytokens, fake credentials that trap attackers

It can take months after a malicious attacker gains access to your system to even know they were there. Next comes months of painful work, analyzing logs, changing credentials, notifying customers, reviewing source code, and we haven’t even talked about the cost of the breach itself. So how can you know when an attacker has infiltrated your systems and bypassed your security? Honeytokens are a great way to know when an attacker has breached your systems.

Honeytokens are credentials that don't actually grant any access but instead trigger alerts that report the intruder's activity.

When attackers gain access to a system, they immediately look for ways to gain more control. One of the easiest ways to expand their presence is to find plaintext credentials lying around in code, config files, or logs, this makes Honeytokens the perfect trap.

In this webinar, we will walk through exactly how to create real Honeytokens you can put in your own infrastructure to trip attackers in their tracks.

If you are working to detect and stop intruders in their tracks, then this webinar is for you.

Hosted by

  • Team member
    T
    Mackenzie Jackson

    Mackenzie is a developer advocate at GitGuardian with a passion for DevOps and security. As the co-founder and former CTO of a health tech startup, he learned first-hand how critical it is to build secure applications with robust developer operations

GitGuardian

Code Security For The DevOps Generation

GitGuardian is a cybersecurity company that offers automated and real-time monitoring to protect businesses from data leaks caused by security breaches through secrets detection on source codes, cloud infrastructures and various platforms. They aim to ...