Machiavelli famously advised “Never attempt to win by force what can be won by deception,” and this is often the mantra of the cybercriminal. The art of deception is by far the most effective weapon in the cyberattacker’s arsenal, posing a greater threat than any single piece of advanced malware or secret software vulnerability, writes Carolyn Crandall, Chief Deception Officer at cybersecurity threat detection product company Attivo Networks.
Attivo Networks, the award-winning leader in deception for cybersecurity threat detection, today announced that Carolyn Crandall, Chief Deception Officer, is presenting at this year’s CSO50 Conference. Her session, “Deception Technology: A Look Under the Hood,” will go beyond deception’s role for in-network threat detection to uncover the value of the technology in identifying, investigating, and responding to attacks – and in reducing risk.
Attivo Networks, the award-winning leader in deception for cybersecurity threat detection, today announced that Carolyn Crandall, Chief Deception (Technology) Officer and Chief Marketing Officer, will present the keynote at this week’s ‘Future-Proof your Channel Marketing’ event run by The Channel Meet Up. In her session, Crandall will use her expertise in both the marketing and technical space to help channel marketers better understand artificial intelligence (AI) and its impact on marketing.
Bad actors have always had the edge in cybersecurity. After all, the good guys have to secure everything, while the bad guys need find only one vulnerability. Given the appalling number of breaches over the years, it’s clear that the established crop of cybersecurity products isn’t up to the task of changing this equation and putting the good guys on top. When I attended this year’s RSA Conference, therefore, I looked for those exceptionally disruptive technologies that promise to turn the tide. Here are my top picks…
Carolyn Crandall has served as the Chief Deception Officer and CMO of Attivo Networks® since 2015 and has over 30 years of experience building emerging technology markets in the security, networking, and storage industries. She has a demonstrated track record of successfully taking companies from preIPO through to multi-billion-dollar sales and has held leadership positions at Cisco, Juniper Networks, Nimble Storage, Riverbed, and Seagate(i365).
Ultimately, security is more of a risk calculation. How much risk are you taking and what are the consequences if you don’t invest. Fines, insurance hikes, lost revenue, hit to brand reputation, and incident response costs can be calculated, however assigning ROSI to one device can be hard as security is a system and only one chink in the armor can bring the whole system down.
As cyberattacks get cheaper and easier to implement, more criminals are expected to get into the business. At the same time, continued proliferation of Internet of Things devices is rapidly expanding the available enterprise attack surface, cybersecurity experts say. And in addition to private-sector cybercriminals, nation-states will be stepping up malicious cyber activities. But there are also some positives to look forward to, including better defensive capabilities and generally more focus on security by enterprise IT leaders…
These days it’s not enough to try to keep cyber-thieves and online spies out of your company’s network — there’s a good chance they’re already in. That’s the rationale behind “deception technology,” a sector of the cybersecurity business that grew out of the reality that no matter how good a firm’s “perimeter security” may be, a global army of extremely clever, morally compromised technologists is working diligently to break it.
Throughout history, deception has been one of the classic strategies underpinning offensive and defensive tactics in military warfare. Camouflage, concealment, and fake information, such as false propaganda or physical decoys, have been used to mislead, confuse, and slow down enemy forces to gain a strategic advantage. It’s one of the classic philosophies from Sun Tzu’s The Art of War: “Rouse him, and learn the principle of his activity or inactivity. Force him to reveal himself, so as to find out his vulnerable spots.”
The number of data breaches experienced by small and middle-market businesses is steadily growing, and compromised customers’ financial information can especially put your company at risk. Fraud protection and data security require not only the right technology but also the right processes. Data-breach incidents can be devastating to small and middle-market businesses. When your customers’ financial information is compromised, it’s a strike against your company’s reputation.