Honeypots are an effective way to lure attackers into delivering malware samples and showing tactics, techniques and procedures (TTPs). Let’s discuss the next steps to take with these systems: which protocol should we support (RDP, SCADA, web), ease of secure deployment, automation, multi-machine environments, interactivity (full vs. low) and increasing the collaboration with open or shared source.