Deception Blogs - Page 2 of 7 - Attivo Networks
Tushar Kothari—Chief Executive Officer

Attivo Perspectives On New Gartner Deception Solution Comparison

Reading Time: 3 minutes
I am pleased to share that Gartner’s newly released research report, Solution Comparison for Six Threat Deception Platforms is now available for subscribers. After months spent compiling research and product evaluations, the report goes into an extensive review on the breadth, depth, authenticity, and ease ...
Read More
SOAR

Learning to SOAR – An Eagle’s-Eye View of Attack Mitigation

Reading Time: 3 minutes
Written by: Nick Palmer, Technical Director, Europe - For as long as I’ve been in security, the conversation has never been far away from the need for automation and the suggestion that only this can truly save us. Taking the prevailing notion that criminals and ...
Read More

Cyber Hygiene – What’s in your Network?

Reading Time: 3 minutes
Written by: Venu Vissamsetty, Vice-President of Security Research - Cyber Hygiene relates to the practice of keeping data safe and secure within an organization's network. Organizations across the world are moving towards deploying IoT devices, adopting cloud computing as well as growing usage of applications ...
Read More

Deciphering Deception Believability

Reading Time: 5 minutes
Written by: Carolyn Crandall, Chief Deception Officer & CMO - Over the last couple of months, I have had the pleasure to work with several leading analyst organizations on deception research and reports. Things had come a long way from 4 years ago when I ...
Read More

Keeping it Real with Authentic Deception Technology

Reading Time: 2 minutes
Written by: Mike Parkin - Technical Marketing Engineer - In a previous blog post, I covered what I call the ‘sweet spot’ for deception, which describes the characteristics and quality deceptive assets need to have to look like the real thing if they’re going to ...
Read More
obvious deception

Obviously, You Can’t Be Obvious

Reading Time: 2 minutes
Written by: Mike Parkin, Product Marketing Engineer - As deception technology has matured into a modern and effective security solution, vendors have pursued different techniques for creating decoys, lures, and the rest of the details that go into a deception platform. One of the challenges ...
Read More
speakup-man-at-computer

New Malware ( SpeakUp ) Leverages Recent Vulnerabilities – And Some Really Old Ones

Reading Time: 2 minutes
Written by: Mike Parkin, Product Marketing Engineer - In the first week of February, Catalin Cimpanu at ZDNet and Kacy Zurkus at Infosecurity Magazine reported on a new malware campaign spreading primarily through China, with smaller infestations in South America and other parts of Asia. ...
Read More
RDP imagery

Using Deception to Counter RDP Attacks

Reading Time: 2 minutes
Written by: Mike Parkin, Product Marketing Engineer - A recent blog post by Ionut Arghire over at SecurityWeek highlighted both Remote Desktop Protocol (RDP) attacks, and attackers using obfuscation and encryption techniques to mask communication while they’re leveraging RDP. It’s an interesting read and it ...
Read More
Protecting-against-cyberattacks

10 Ways to Protect Against Cyberattacks

Reading Time: 5 minutes
Written by: Carolyn Crandall, Attivo Networks CMO and Chief Deception Officer - As the threat landscape continues to evolve, today’s security experts will tell you that both perimeter security and active, in-network defenses are required to build a comprehensive cybersecurity solution. But they’ll also tell ...
Read More
boxing and deception

Using Deception to Fix the Fight

Reading Time: 3 minutes
Written by: Tony Cole, Attivo Networks CTO - I spoke with a CISO the other day that I’ve known for a long time about Deception Technology and asked him why he has yet to give it a try. His response? I don’t think deception is ...
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top