carolyn crandall Blog Terms - Page 2 of 11 - Attivo Networks

carolyn crandall

Attivo Networks’ Chief Deception Officer Hosts EWF Session on Navigating Business and Technology

Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced it will host a pre-recorded session at the 2020 Executive Women’s Forum titled: “How to Navigate the Role of a Business Leader and a Technology Leader.” Carolyn Crandall, chief deception officer and CMO of Attivo Networks, and Kumar R. …

Attivo Networks’ Chief Deception Officer Hosts EWF Session on Navigating Business and Technology Read More »

How defence in depth can sink cyber attacks

The cybersecurity of financial institutions is appearing as a top priority for the Bank of England in the coming months. The central bank will focus on stress testing IT defences for online attacks and establishing new standards for how quickly and effectively financial institutions should contain these breaches. The objective is to improve banks’ operational …

How defence in depth can sink cyber attacks Read More »

Attivo Networks to Host Webinar on the ROI of Deception Technology

Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced it will host a webinar titled, “Cost Savings of Deception Quantified.” The webinar will be hosted by Carolyn Crandall, Chief Deception Officer and CMO of Attivo Networks, and Kevin Fiscus, SANS Institute Principal Instructor and founder of Deceptive Defense. …

Attivo Networks to Host Webinar on the ROI of Deception Technology Read More »

Targeted ransomware – it’s upon us. Are you ready?

Ransomware is evolving. Threat actors are moving away from indiscriminate attacks, instead choosing their marks very carefully with precisely targeted ransomware to achieve their desired outcome. In addition to targeting specific companies, they are striking at the most important and lucrative parts of the network. Often this is done with complete disregard for ethics. For …

Targeted ransomware – it’s upon us. Are you ready? Read More »

Compromised Devices Await Office Return to Strike

When organizations start transitioning back to the office from the current pandemic-wrought remote work environment, there will likely be some relief for seemingly having made it through lockdown successfully. However, with threat activity reaching record levels in this period, there is every chance employees return to the office and bring malicious programs and code that’s …

Compromised Devices Await Office Return to Strike Read More »

Want stronger cybersecurity? Start by improving east-west traffic detection

When it comes to stopping cyber attackers, most information security teams primarily concern themselves with north-south traffic. This traffic moves between an internal network and the broader internet, and it is where most security tools, including firewalls, intrusion detection and prevention tools, tend to focus their efforts. This line of thinking is understandable — to …

Want stronger cybersecurity? Start by improving east-west traffic detection Read More »

Security Magazine

Derailing ransomware 2.0 requires a little trickery

Ransomware attacks are on the rise – and they are getting more and more sophisticated and destructive. That is bad news for executives struggling to maintain a high level of cybersecurity even as their organizations continue to cope with the massive impact of a pandemic. The good news? Technology is available to help companies better …

Derailing ransomware 2.0 requires a little trickery Read More »

Attivo Networks to Host RiskSec DIGITAL 2020 Session on Securing the Expanded Attack Surface

Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced it will host a live “Ask Me Anything Session” at RiskSec DIGITAL 2020 Conference titled, “The Expanded Attack Surface and Your Security Stack – Are you Ready?” Session speakers will be Carolyn Crandall, chief deception officer of Attivo Networks, …

Attivo Networks to Host RiskSec DIGITAL 2020 Session on Securing the Expanded Attack Surface Read More »

How do I select a remote workforce protection solution for my business?

Comments from Carolyn Crandall, Chief Deception Officer, Attivo Networks When selecting a remote workforce protection solution, CISOs need to consider three key areas: exposed endpoints, security for Active Directory (AD) and preventing malware from spreading. Exposed endpoints: standard anti-virus software and VPNs are no match for advanced signature-less or file-less attack techniques. EDR tools enhance …

How do I select a remote workforce protection solution for my business? Read More »

CDM Logo

There’s a Hole in Your Threat Detection Strategy—It’s Called East/West Traffic

One of the most popular targets for attackers, cybercriminals, and other bad actors is east/west network traffic. This is network traffic that originates from one internal host or network segment, and whose destination is another internal host or network segment. North/south traffic, on the other hand, moves from an internal network out to the Internet. …

There’s a Hole in Your Threat Detection Strategy—It’s Called East/West Traffic Read More »

Scroll to Top