Attivo Networks Blog Terms - Page 16 of 39 - Attivo Networks

Attivo Networks

Attivo Networks

CMO Inflect 2018 – Role and Impact of the CMO

What is the Role and Impact of the CMO? What ought to be the goal of the CMO? An ever evolving role, how has it changed over time? What are the new challenges that CMOs of today are facing? Do CMOs need to be technologists to truly promote their companies? What does the role of the CMO look like depending on the stage of the company (early, mid-stage, public)? These are just some of the questions the speakers answered in this panel!

American Security Today

Attivo Networks Makes Deception Technology Deceptively Simple

Attivo Networks®, Triple-Award Winner in the 2017 ‘ASTORS’ Homeland Security Awards Program, a Finalist in the 2018 ‘ASTORS’ Awards, and a leader in deception for cyber security threat detection, includes new advanced capabilities that use machine learning to automatically generate and deploy the most authentic deception that covers an extensive set of attack vectors at scale.

Carolyn Crandall—Chief Deception Officer/CMO

And That’s a Wrap – Gartner Security and Risk Summit Recap

Written by: Carolyn Crandall, CMO & Chief Deception Officer I always look forward to the Gartner Security and Risk Summit to hear their vision and insights into the future. Last year, I was not as inspired by the back to basics message, as it didn’t provide as much visibility into new innovation as I was seeking. This year was still a little light in the promotion of innovation, though I found usefulness in how they were trying to educate security professionals on what I will call “inspired thinking”.

Detecting MITM attackers

On the Shoulders of Giants?

Written by: Nick Palmer, Attivo Networks Technical Director, Europe I’ve come a long way in my view of more traditional security controls. For the longest time, I labored under the misapprehension that endpoint solutions were just signature based and that SIEM solutions’ primary value was in retrospective analysis of breaches, rather than threat hunting as augmented by relatively novel ideas like User Behavior Analytics (UBA).

Tony Cole -Chief Technology Officer

Why Deception Technology?

Written by: Tony Cole, Attivo Networks CTO There are a lot of questions around why deception technology is applicable to cyber defense. There are many insightful answers to this question. The most pertinent one is that it allows you to shrink adversary dwell time inside your environment. Let’s talk about deception for a moment before digging into how it can reduce attackers’ dwell time.

Scroll to Top