Hunting Cybercriminals with AWS Honey Tokens

BLACK HAT ASIA – Singapore – Security analysts here today demonstrated how to detect security breaches by using Amazon Web Services (AWS) keys as honey tokens to lure cybercriminals. A honey form is any form of credential or resource that you can use for monitoring and logging on, but doesn’t exist anywhere in practical terms, explained Daniel Grzelak, head of security at Atlassian.

Read full news article on Dark Reading: Cloud