Active Defense

Deception Checklist: What to Look for in a Deception Technology Solution

Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks – In today’s quickly evolving threat landscape, perimeter defenses are no longer enough to keep attackers out. Firewalls and antivirus software still play a needed role in cybersecurity, but organizations require additional tools to detect and derail attackers once they have entered the network. Unfortunately, it is impossible to prevent 100% of attacks, which means today’s organizations must assume that their network has already been breached—and defend themselves accordingly.

digital health age

How deception can combat the cybersecurity threat to medical devices

In an interview with Digital Health Age web content editor Ian Bolland, Crandall explained the issues that are affecting medical devices when it comes to cybersecurity, including being built on operating systems that were designed to be in networks that are not interconnected. While things are getting connected, the devices that are going onto networks were never designed to be secure in such a way, and the ownership of security is a contentious issue.

Attivo Networks® Receives Multiple Honors for Advanced Threat Detection Innovation in Cyber Defense Magazine’s 2019 InfoSec Awards

“As the cybersecurity industry gathers at RSA this week, we are honored to be recognized by the 2019 InfoSec Awards as a proven leader in deception solutions and in detecting advanced threats,” said Attivo Networks CEO, Tushar Kothari. “With the Attivo Networks platform, customers can deceive, direct, and divert adversaries away from critical assets while safely collecting intelligence on their activity. The power to identify advanced attackers and better understand adversaries is having a clear and direct impact in reducing time-to-detection and the time it takes to investigate and respond to attacks.”

2019_CRN-Security100_Award

Attivo Networks® Recognized on CRN’s 2019 Security 100 List

FREMONT, Calif. – February 26, 2019 – Attivo Networks® today announced today that CRN®, a brand of The Channel Company, has named Attivo Networks to its annual Security 100 list in the Network Security category. This list recognizes the coolest security vendors in each of five categories: Endpoint Security; Identity Management and Data Protection; Network Security; SIEM, Risk and Threat Intelligence; and Web, Email and Application Security.

gov-matters-url-logos

How agencies can mitigate the impact of inevitable cyber breaches

One of the Office of Management and Budget’s goals for FY19 is to standardize cybersecurity capabilities and practices across the federal government. However, deciding which of these capabilities need to be deployed is a challenge. Tony Cole, chief technology officer at Attivo Networks, says that there are multiple obstacles to maintaining continuous diagnostics and mitigation at government agencies.

the-mercury-news

Setting traps for cyber-thieves with ‘deception technology’: Carolyn Crandall

These days it’s not enough to try to keep cyber-thieves and online spies out of your company’s network — there’s a good chance they’re already in. That’s the rationale behind “deception technology,” a sector of the cybersecurity business that grew out of the reality that no matter how good a firm’s “perimeter security” may be, a global army of extremely clever, morally compromised technologists is working diligently to break it.

How deception changes the rules of engagement in cyber security

Throughout history, deception has been one of the classic strategies underpinning offensive and defensive tactics in military warfare. Camouflage, concealment, and fake information, such as false propaganda or physical decoys, have been used to mislead, confuse, and slow down enemy forces to gain a strategic advantage. It’s one of the classic philosophies from Sun Tzu’s The Art of War: “Rouse him, and learn the principle of his activity or inactivity. Force him to reveal himself, so as to find out his vulnerable spots.”

resolutions image

Six 2019 Resolutions That Can Improve Organizational Cybersecurity

Authored by: Carolyn Crandall, The new year is upon us, and the need for comprehensive cybersecurity is as strong as ever. As threats that continue to evolve and expand, it is critical that organizations prepare for the future with a plan to address the most vulnerable aspects of their threat detection and response strategies. Breaches are already making headlines in 2019, and organizations are increasingly looking for ways to shift the balance of power away from the attacker.

Help Net Security Logo

Deception for proactive defense

For many years, enterprise cyber security was primarily reactive. That is, a network perimeter was established to prevent attacks, and if a breach occurred, then response activities were initiated. Typical cyber response activities would include perimeter adjustments, vulnerability remediation, and damage containment. The methodology of prevent, detect, and respond (in that order) has thus driven cyber security design for most teams.

Scroll to Top