One of my well-received presentations on how to obfuscate the edge, frustrate hackers seeking to fingerprint the organization, and emulate a virtual network to create a low-interaction honeynet, by leverage unused IP address space in class A,B,C domains.
While most hacks today are identity-based, a honeynet is still a viable means of finding attackers seeking to compromise internet-facing hosts.
Related topics: