How to detect software supply chain attacks with Honeytokens?

25/08/2023 19 min Temporada 4 Episodio 33

Listen "How to detect software supply chain attacks with Honeytokens?"

Episode Synopsis

Can Honeytokens be used in your supply chain security? Turns out we can! We spoke to Mackenzie Jackson ( @advocatemack ) from  @GitGuardian  about the benefits of using Honeytokens, which organisations can benefit from them and whats involved in deploying them and next steps once they are triggered.

Episode YouTube: ⁠ ⁠⁠Video Link⁠⁠⁠⁠⁠

Host Twitter: Ashish Rajan (⁠⁠⁠⁠⁠⁠⁠⁠⁠@hashishrajan⁠⁠⁠⁠⁠⁠⁠⁠⁠)
Guest Socials: Mackenzie Jackson (⁠ @advocatemack ⁠)
Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- ⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠
- ⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠⁠⁠⁠⁠⁠⁠⁠

Spotify TimeStamp for Interview Question
(00:00) Introduction
(02:01) A bit about Mackenzie Jackson
(02:37) What are Honeytokens?
(03:35) Traditional threat detection
(05:29) Honeytoken in action
(07:02) Deployments for Honeytokens
(09:46) Role of Honeytoken in Supply Chain
(11:02) Deploying and managing Honeytokens
(13:12) Incident response with Honeytokens
(15:01) What companies should use Honeytokens?
(16:05) What if the key is deleted !

Resources:
You can find out more about Honeytokens & GitGuardian here!
See you at the next episode!

More episodes of the podcast Cloud Security Podcast