Deception Blogs - Attivo Networks

Celebrating the 30th Anniversary of Honeypots

Reading Time: 5 minutes
Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - The word “honeypot” has a specific connotation. Within the world of cybersecurity, it generally refers to a trap set for an attacker, designed to lure them into revealing their intent to attack the network. Unfortunately, ...
Read More

Deception Checklist: What to Look for in a Deception Technology Solution

Reading Time: 5 minutes
Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - In today's quickly evolving threat landscape, perimeter defenses are no longer enough to keep attackers out. Firewalls and antivirus software still play a needed role in cybersecurity, but organizations require additional tools to detect and ...
Read More

CISOs Weigh In: Detection Across Attack Surfaces Is their Top Priority

Reading Time: 3 minutes
Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks - Earlier this year, we worked with SINC to conduct a study on the state of cybersecurity in the United States today. The research focused on companies with over 1,000 employees and over $25 million in ...
Read More

Be Resilient: Using Cyber Deception to Combat Cyber Risk Following COVID-19

Reading Time: 7 minutes
Written by: Carolyn Crandall, Chief Deception Officer and CMO - I recently read the Gartner guidance document on being resilient to prepare for cyber risk following COVID 19. I thought it would be interesting to look at their guidance and to see how using Attivo ...
Read More

Detecting Attackers Exploiting IBM Data Risk Manager Vulnerabilities with Deception

Reading Time: 2 minutes
Written by: Venu Vissamsetty, VP Security Research, Founding Engineer Attivo Networks - Security Researcher Pedro Ribeiro from the Agile Information Security firm revealed that IBM Data Risk Manager contains four critical severity vulnerabilities, which an unauthenticated attacker can exploit over the network. Attackers can chain ...
Read More
cyber deception

Insights into Using Cyber Deception

Reading Time: 4 minutes
Written by: Carolyn Crandall, Chief Deception Officer - Over the past five years, the conversation around cyber deception has advanced from the question of what it is to what to use it for. Fundamentally, cyber deception has evolved into a highly regarded threat detection solution ...
Read More

Deception: An Essential Element of your Cyber Defense Strategy – OODA Loop

Reading Time: 2 minutes
Written by: Mackenzie Blaisdell, Content Marketing Manager - Last week, OODA Loop published an article on why “Deception Needs to be an Essential Element of Your Cyber Defense Strategy” while looking into in-demand, risk-mitigating cybersecurity technologies. It is not a surprise, as we have seen ...
Read More
predictions

Cybersecurity Predictions for the Second Half of 2019

Reading Time: 6 minutes
Authored by: Carolyn Crandall, Chief Deception Officer - At the beginning of the year, I spent some time looking ahead at what the future might hold for the cybersecurity community, and I suggested a few resolutions that might help forward-thinking organizations improve their defense against ...
Read More
Tushar Kothari—Chief Executive Officer

Attivo Perspectives On New Gartner Deception Solution Comparison

Reading Time: 3 minutes
I am pleased to share that Gartner’s newly released research report, Solution Comparison for Six Threat Deception Platforms is now available for subscribers. After months spent compiling research and product evaluations, the report goes into an extensive review on the breadth, depth, authenticity, and ease ...
Read More
SOAR

Learning to SOAR – An Eagle’s-Eye View of Attack Mitigation

Reading Time: 3 minutes
Written by: Nick Palmer, Technical Director, Europe - For as long as I’ve been in security, the conversation has never been far away from the need for automation and the suggestion that only this can truly save us. Taking the prevailing notion that criminals and ...
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top