They are essentially fake or specially created credentials, data files, or network resources that are intentionally left vulnerable or exposed to attract potential attackers.
The purpose of honey tokens is to serve as an early warning beacon, enabling organisations to detect potential security breaches more effectively. By monitoring activity around honey tokens, security teams can identify and analyze methods, tools, and tactics used by cyber actors, gaining valuable insights into techniques and motives.
In the context of web application development, honey pot tokens can be used as a security measure to identify and mitigate potential threats to a publically hosted we application.
Read more
If you are interested in finding out more about the IISF, or would like to attend one of our Chapter Meetings as an invited guest, please contact the
IISF Secretary:
By email:
secretary@iisf.ie
By post:
David Cahill
Information Security
GPO, 1-117
D01 F5P2
Enhance your Cybersecurity knowledge and learn from those at the coalface of information Security in Ireland
Invitations for Annual Sponsorship of IISF has now reopened.
Sponsors are featured prominently throughout the IISF.IE website, social media channels as well as enjoying other benefits Read more