How to detect software supply chain attacks with Honeytokens? - a podcast by Kaizenteq Team

from 2023-08-25T18:16:51

:: ::

Can Honeytokens be used in your supply chain security? Turns out we can! We spoke to Mackenzie Jackson ( @advocatemack ) from  @GitGuardian  about the benefits of using Honeytokens, which organisations can benefit from them and whats involved in deploying them and next steps once they are triggered.




Episode YouTube:⁠⁠Video Link⁠⁠⁠⁠⁠




Host Twitter: Ashish Rajan (⁠⁠⁠⁠⁠⁠⁠⁠⁠@hashishrajan⁠⁠⁠⁠⁠⁠⁠⁠⁠)


Guest Socials: Mackenzie Jackson (⁠ @advocatemack ⁠)


Podcast Twitter ⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠


If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:


- ⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠


⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠⁠⁠⁠⁠⁠⁠⁠




Spotify TimeStamp for Interview Question


(00:00) Introduction
(02:01) A bit about Mackenzie Jackson
(02:37) What are Honeytokens?
(03:35) Traditional threat detection
(05:29) Honeytoken in action
(07:02) Deployments for Honeytokens
(09:46) Role of Honeytoken in Supply Chain
(11:02) Deploying and managing Honeytokens
(13:12) Incident response with Honeytokens
(15:01) What companies should use Honeytokens?
(16:05) What if the key is deleted !




Resources:


You can find out more about Honeytokens & GitGuardian here!


See you at the next episode!

Further episodes of Cloud Security Podcast

Further podcasts by Kaizenteq Team

Website of Kaizenteq Team