Another name for Intel: Honeypots

Gathering Threat Intelligence is an art. Using it to your advantage is magic. Do you even know what your real security profile is and who or what is attacking you? Vulnerability scans are great, but are you really vulnerable? Using OSS across honeypots , VPS's and even Raspberry Pis, none of which requires rocket-science-like technical skills to deploy, allow you to see the profile of those who might be attacking you. Gathering real Threat Intel, in a live environment, directed at your systems and using the data to be more secure!

Presented by