Deception Blogs - Page 3 of 7 - Attivo Networks

Why Credential-based Deception Used Alone is Not Enough -2/5

Reading Time: 3 minutes
Written by: Tony Cole, Attivo Networks CTO - Over the years the tools, tactics, processes, and expertise has become readily available to organized crime through leaks, uncovered attack campaigns, moonlighting, and countless other routes. In other words, the lines have blurred between who is organized ...
Read More
Image of Tony Bradley - Proactive Defense

Deception Technology Provides a Proactive Defense that Gives You an Edge Over Attackers

Reading Time: 4 minutes
Written by: Tony Bradley, Senior Manager of Content Marketing for Alert Logic and Editor-in-Chief of TechSpective - Traditional cybersecurity is almost entirely reactive. You follow established best practices and implement security tools and processes and then you wait. You wait for an attacker you hope ...
Read More
cybersecurity halloween

What Could be Coming to Haunt Your Organization this Halloween

Reading Time: 5 minutes
Written by: Carolyn Crandall, Attivo Networks CMO - Halloween may be the only time of the year when monsters, vampires and ghosts parade the streets at night spooking the public. However, in the dark online world of sophisticated adversaries and expanding attack surfaces, threats continue ...
Read More

The USA Has More Breach Notification Laws than Baskin Robbins Has Ice Cream Flavors, Now What?

Reading Time: 6 minutes
Written by: Carolyn Crandall, CMO & Chief Deception Officer - Since the original breach notification law was enacted in California in 2002, each of the 50 states and District of Columbia, Puerto Rico, Guam, and the Virgin Islands, have all enacted breach notification laws that ...
Read More

Changing the Economics of Cryptocurrency Mining Attacks with Deception Technology

Reading Time: 5 minutes
Written by: Carolyn Crandall, Attivo Networks Chief Deception Officer and CMO - Cryptocurrency mining attacks have skyrocketed in the last year with the Cyber Threat Alliance (CTA) members reporting an increase in cryptominer detections by 459% from 2017 through 2018, rapidly becoming one of the ...
Read More

Attivo Networks Deception Technology Word Search

Reading Time: 2 minutes
I N V C G L Z A J P D U S A T O T E Y B M Y O D A C U G C I S B T F U Y C C T A P M Z I S ...
Read More

Your Network Has Been Compromised. Now What?

Reading Time: 4 minutes
Written by: Carolyn Crandall, Chief Deception Officer and CMO - The Role of Deception in Stopping Attackers Mid-Breach The morning it all went wrong, when you realize that someone has compromised your company…and it’s bad! The morning starts off as a routine day of a ...
Read More

Deception Technology Brings Value to Security Department of One

Reading Time: 3 minutes
Written by: Marc Feghali, Attivo Networks Co-founder and VP of Product Management - Following my last blog on the deployment of deception technology, I received some questions/comments that fell into the following 2 categories: Deception technology is targeted at large companies, but not mid-size organizations ...
Read More

Deception at Black Hat: Hype or Next Security Wave?

Reading Time: 4 minutes
Written by: Carolyn Crandall, CMO and Chief Deception Officer - In part 1 of my Black Hat recap, I published a post highlighting some of the key themes and noteworthy topics that drove conversations at Black Hat 2018. One development that was abundantly clear, was ...
Read More

Black Hat 2018: Election Hacking, Active Defense, and More…

Reading Time: 6 minutes
Written by: Carolyn Crandall, CMO and Chief Deception Officer - With another busy Black Hat now behind us, we’re catching our breath and reflecting on some of the key themes at this year’s event. Prior to the show, I put together a list of activities ...
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top