Star 0

Abstract

How do you cope when you’re being attacked thousands of times per second? How do you take this information and turn it into meaningful threat intelligence? How do you track attackers back to their home town? Who are they, what do they want and where are their profile pics?
To answer our these questions and to better protect Azure it’s not enough to just set up a honeypot and watch the results roll in, we needed something different – something that would work at the cloud scale.

Videos