It is important for security practitioners to have a clear understanding of current and emerging cyber threats to their enterprise. One of the tools available to them in their arsenal (but seldom used) is the deployment of honeypots as baits in their environment.
Honeypots as a security technology has been in existence from 2000, they were advances made on earlier solutions like a (chroot) jail as described in the 1991 path breaking paper by B Cheswick “An evening with berferd in which a cracker is lured, endured and studied”.
Honeypots however did not gain wide acceptance, as they did not yield commensurate benefits, being cumbersome to deploy and manage within an enterprise environment. On the other hand, they became excellent tools for researchers to study and observe the attackers.