Threat Detection Blogs - Attivo Networks

Playbook for Exercising Deception Based on MITRE ATT&CK® Framework

Reading Time: 5 minutes
Written by: Joe Carson, Sr. Director, Professional Services at Attivo Networks, Inc. - From time to time, I am asked to help a customer validate the efficacy of their deception implementation. This can be part of a pilot deployment, or after full operationalization. In many ...
Read More

Be Resilient: Using Cyber Deception to Combat Cyber Risk Following COVID-19

Reading Time: 7 minutes
Written by: Carolyn Crandall, Chief Deception Officer and CMO - I recently read the Gartner guidance document on being resilient to prepare for cyber risk following COVID 19. I thought it would be interesting to look at their guidance and to see how using Attivo ...
Read More

Detecting Attackers Exploiting IBM Data Risk Manager Vulnerabilities with Deception

Reading Time: 2 minutes
Written by: Venu Vissamsetty, VP Security Research, Founding Engineer Attivo Networks - Security Researcher Pedro Ribeiro from the Agile Information Security firm revealed that IBM Data Risk Manager contains four critical severity vulnerabilities, which an unauthenticated attacker can exploit over the network. Attackers can chain ...
Read More
predictions

Cybersecurity Predictions for the Second Half of 2019

Reading Time: 6 minutes
Authored by: Carolyn Crandall, Chief Deception Officer - At the beginning of the year, I spent some time looking ahead at what the future might hold for the cybersecurity community, and I suggested a few resolutions that might help forward-thinking organizations improve their defense against ...
Read More
cybersecurity halloween

What Could be Coming to Haunt Your Organization this Halloween

Reading Time: 5 minutes
Written by: Carolyn Crandall, Attivo Networks CMO - Halloween may be the only time of the year when monsters, vampires and ghosts parade the streets at night spooking the public. However, in the dark online world of sophisticated adversaries and expanding attack surfaces, threats continue ...
Read More

The USA Has More Breach Notification Laws than Baskin Robbins Has Ice Cream Flavors, Now What?

Reading Time: 6 minutes
Written by: Carolyn Crandall, CMO & Chief Deception Officer - Since the original breach notification law was enacted in California in 2002, each of the 50 states and District of Columbia, Puerto Rico, Guam, and the Virgin Islands, have all enacted breach notification laws that ...
Read More

Cybersecurity in the Middle East: It’s time for a Change

Reading Time: 3 minutes
By: Ray Kafity, Vice President, Middle East, Turkey & Africa Things are heating up in the Middle East when it comes to cyberattacks, with entire industries, including regional governments, feeling the brunt. So much so, that mainstay industries like Banking & Finance, Oil & Gas, ...
Read More

DARPA Gets Serious About Tackling Dwell Time

Reading Time: 2 minutes
Written by: Carolyn Crandall, Chief Deception Officer and CMO - Dark Reading recently reported on a new Defense Advanced Research Projects Agency (DARPA)-funded research project at Georgia Tech aimed at reducing dwell time. The $12.8 million project, known as “Gnomon,” will look to establish new ...
Read More

Attivo Networks Awarded Most Innovative Products by One Planet

Reading Time: 2 minutes
By: Carolyn Crandall, CMO   While the year is only a few weeks old, Attivo Networks is starting 2017 off with several new achievements. Since the beginning of the year, we have announced an exciting new partnership with Check Point Software, released the results of ...
Read More

Deception as a Security Discipline: Frost and Sullivan Stratecast Report

Reading Time: 4 minutes
By; Carolyn Crandall , CMO Mid 2016, Frost and Sullivan released a Stratecast report on Deception as a Security Discipline - Going on the Offensive in the Cybersecurity Battlefield. In this report, author Michael Suby, takes a close look at deception technology and speaks to ...
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top