Deception — isn’t that a DecoyDoc? That’s a frequently asked question when the topic of deception technology arises. This two-part post will trace the origins of DecoyDocs, the rationale behind them, and what factors ultimately hampered their wide-scale adoption. The second post will focus on what makes up modern-day deception technology, how the application of deception technology has evolved, and which features and functions are driving its adoption and global deployment.
By: Carolyn Crandall Last week, Attivo Networks participated in The Information Systems Security Association (ISSA)® event in San Diego, CA. With the theme of “the Digital Danger Zone,” the conference focused on topics ranging from incident response to application security to business skills for the information security professional. Apart from educational forums, publications, and peer interaction opportunities, ISSA hosted a capture the flag (CTF) event, which is always a fun way to test one’s practical information security knowledge. This year, Attivo participated in the CTF as well as a speaking session, Cybersecurity of Interbank Messaging and Wholesale Payment Networks.
By: Edward Amoroso Years ago, I became aware of a cable TV company whose customers were ripping off pay-per-view content. One root cause involved teenagers replacing their set-top box CPU with a test version of the chip purchased from an on-line TTL dealer. Because the test CPU descrambled everything, these clever teens no longer had to squint to make sense of those scrambled images on the Spice Channel.
Attivo Networks ThreatDefend™ Platform steps up complexity to attackers and arms incident responders with powerful tools for actionable defense. Carolyn Crandall, Chief Marketing Officer at Attivo Networks, Inc.
Using the word deception and government together is not viewed as surprising and will typically elicit a chuckle or possibly, even a groan.
By: Carolyn Crandall An African proverb says, “If you want to go fast, go alone. If you want to go far, go together.” There are many challenges that come with being a channel partner: margins are under pressure, customers’ expectations change daily, and new technologies emerge all the time that alter the market and competitive landscape.
By Carolyn Crandall, CMO Attivo Networks
Ransomware continues to dominate the security news cycle and the minds of most enterprise
organizations. Whether this is driven by the recent flood of Petya attacks, the previous global
WannaCry attacks or validation by recent studies such as the one by Trend Micro, which found
that new ransomware families increased by a whopping 752% in 2016, the concern is valid and
deserving of attention.
Notably, the report adds that the availability of open source ransomware and ransomware-as-a
service (RaaS) will continue to make it easier for cybercriminals to run their own ransomware,
further fueling attacker momentum.