breach Blog Terms - Attivo Networks

breach

Attivo Offers Limited-Time Software Use to Combat Privilege Escalation and Lateral Movement

Author: Tushar Kothari, CEO – If anyone had any doubts about whether the attackers are already inside your networks, then the last week’s events indicate that you must expect that attackers already came in through various back doors. Some notable highlights from industry and government also drive this point home. “Once inside the network, attackers …

Attivo Offers Limited-Time Software Use to Combat Privilege Escalation and Lateral Movement Read More »

Organizations utilizing cyber detection reduce data breach-related costs

Attivo Networks, announced the results of a new research report conducted with Kevin Fiscus of Deceptive Defense, Cyber Deception Reduces Breach Costs & Increases SOC Efficiency. The paper identifies the direct and measurable financial and productivity benefits of deception technology for organizations of all types and sizes. The report reveals that companies utilizing cyber detection …

Organizations utilizing cyber detection reduce data breach-related costs Read More »

Webinar: Learn to SOAR with Deception Technology

Join us to learn how the Attivo Networks in-network deception technology can strengthen your existing Security Orchestration, Automation, and Response (SOAR) solution. SOAR addresses the issues that SOCs regularly deal with, such as the volume of alerts and a lack of experienced security personnel. The Attivo Networks ThreatDefend platform can help security teams address challenges …

Webinar: Learn to SOAR with Deception Technology Read More »

Reflections on “Hacker Summer Camp”

At this time of year, Las Vegas turns into what many refer to as “hacker summer camp,” and the moniker is certainly a fitting one. The Black Hat 2019 conference, held August 3-8, is now in its 22nd year and drew over 20,000 security professionals from all across the country for technical training, presentations, briefings, networking, and more. BSides Las Vegas also held its annual conference from August 6-7, drawing a similar (and often overlapping) audience to help disseminate security knowledge throughout the industry. And of course, DEF CON 2019 took place from August 8-11, with security workshops, training sessions, and demo labs. For security professionals, it doesn’t get much better than this.

betanews

Deception technology speeds up detection of attacks

Users of deception technology report a 12X improvement in the average number of days it takes to detect attackers operating within an enterprise network. New research for Attivo Networks carried out by Enterprise Management Associates suggests attacker dwell times can be as low as 5.5 days with deception in use compared to an average of 78 to 100 days for those not using the technology.

CRN

12 Big New Network And Endpoint Security Tools From The Black Hat 2019 Conference

New capabilities on the Attivo Networks ThreatDefend Platform monitor available services on production endpoints and redirect attempted access into a deception environment. Every endpoint on the network becomes a decoy and, when paired with Attivo’s deception lures, locks down an attacker’s ability to break out from the endpoint without getting caught.

As a result, defenders gain visibility into the attacker’s tools, the use of malicious software, and attempted lateral movement, and are able to quickly quarantine infected systems. Creating a deception blanket over the endpoint ensures cybercriminals can’t bypass or avoid detection regardless of the attack method they ultimately choose.

IT Pro

Security Incident Response Planning: 4 Lessons Learned

One of the most important, and yet easily overlooked, elements of keeping an organization secure is creating an incident recovery roadmap–also known as an incident recovery plan. As its name implies, this plan provides a course of action to be taken following a security incident. Having been involved in the creation of several such plans over the years, I wanted to pass along some lessons learned.

early-adopter-research-full-color

EAR Podcast with Attivo Networks’ Carolyn Crandall

In the latest episode of the Early Adopter Research (EAR) Podcast, EAR’s Dan Woods spoke with Carolyn Crandall, the chief deception officer of Attivo Networks, while both were at the RSA 2019 Conference. Their conversation covered Woods’ three big cybersecurity questions for the year, and Crandall also explained the position of Attivo Networks in the cybersecurity landscape. They covered…

Here’s What Cybersecurity Experts Worry About This Year

As cyberattacks get cheaper and easier to implement, more criminals are expected to get into the business. At the same time, continued proliferation of Internet of Things devices is rapidly expanding the available enterprise attack surface, cybersecurity experts say. And in addition to private-sector cybercriminals, nation-states will be stepping up malicious cyber activities. But there are also some positives to look forward to, including better defensive capabilities and generally more focus on security by enterprise IT leaders…

Back to the future for 2019

There are more U.S. breach notifications laws than Baskin Robbins ice cream flavors, and the inconsistency of these laws will continue to cause confusion and compliance challenges for companies throughout 2019. We will see an increase in fines levied and potential jail time for those who do not meet the expectation of these measures. States like California, Rhode Island, and Massachusetts have all been very aggressive in their enforcement of these laws, a trend likely to be closely followed throughout the next year. Many organisations struggle with the lack of clarity of breach disclosure definitions and expectations. States that create notification laws that include defined processes will help organisations be better prepared and compliant to disclosure strategies in the event of a breach. This will promote more strategic thought processes for recording and reporting incidents and will reinforce that it is no longer enough to quickly notify on a breach incident, they will also need to accurately identify the full impact of the event. Going forward, organisations will be expected to fully understand how widespread the attack was, how deeply the attacker penetrated, and how to set the right controls in place to prevent their return.”

Scroll to Top