attacks Blog Terms - Attivo Networks

attacks

Attivo Networks: Deception technology against ransomware

Firewalls and classic solutions for endpoint security are not enough to defend against increasingly sophisticated and targeted attacks against IT infrastructure and applications, warn the security specialists at Attivo Networks. Although this combination would offer a certain level of protection against common and simple malware attacks, more sophisticated and targeted attacks also require sophisticated detection …

Attivo Networks: Deception technology against ransomware Read More »

OODAcast – A Conversation with Tony Cole of Attivo Networks

OODA CTO Bob Gourley was joined by Tony Cole of Attivo Networks in an interactive discussion on the state of cybersecurity, with a focus on how deception technologies can be leveraged by organizations of all sizes to mitigate risks. … This interview examines: The evolution of the early cyber “honey pots” designed to trap hackers …

OODAcast – A Conversation with Tony Cole of Attivo Networks Read More »

Cyber Prevention Is No Panacea

By Tony Cole, CTO, Attivo Networks Last year Gartner estimated cybersecurity spending to grow to $124 Billion US dollars globally, and by 2021 to be over $170 Billion yet we consistently hear about major compromise after major compromise. What’s going on? Why isn’t the massive amount of dollars being pumped into our security infrastructure, paying …

Cyber Prevention Is No Panacea Read More »

IT Web logo

Visibility, intelligence at the heart of next-generation security

Ray Kafity, VP at Attivo Networks META region, said it is generally understood that prevention alone is not enough, and attackers now have the ability to ‘roam’ or sit inside a network for extended periods of time before proceeding with an attack/data breach. There is a need to have a tool to control the network once it is compromised. Businesses are now looking to deploy so-called ‘honey pots’ inside the network to trap the attacker by creating a fake environment based on a deception solution. However, this solution must be based on authentic operating systems and must reflect a similar DNA to the true network.

Scroll to Top