How to detect software supply chain attacks with Honeytokens? - a podcast by Kaizenteq Team
from 2023-08-25T18:16:51
Can Honeytokens be used in your supply chain security? Turns out we can! We spoke to Mackenzie Jackson ( @advocatemack ) from @GitGuardian about the benefits of using Honeytokens, which organisations can benefit from them and whats involved in deploying them and next steps once they are triggered.
Episode YouTube: Video Link
Host Twitter: Ashish Rajan (@hashishrajan)
Guest Socials: Mackenzie Jackson ( @advocatemack )
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Newsletter
- Cloud Security BootCamp
Spotify TimeStamp for Interview Question
(00:00) Introduction
(02:01) A bit about Mackenzie Jackson
(02:37) What are Honeytokens?
(03:35) Traditional threat detection
(05:29) Honeytoken in action
(07:02) Deployments for Honeytokens
(09:46) Role of Honeytoken in Supply Chain
(11:02) Deploying and managing Honeytokens
(13:12) Incident response with Honeytokens
(15:01) What companies should use Honeytokens?
(16:05) What if the key is deleted !
Resources:
You can find out more about Honeytokens & GitGuardian here!
See you at the next episode!
Further episodes of Cloud Security Podcast
Further podcasts by Kaizenteq Team
Website of Kaizenteq Team