cyber deception Archives - Attivo Networks

cyber deception

TAG Cyber Security Annual 4th Quarter: PREVENTING AND DETECTING LATERAL MOVEMENT

Register for Nov. 3 webinar, “Chris Krebs: What’s Buried in Every Breach Report that No One is Talking About” When advanced attacks are initiated toward an enterprise, several familiar tactics are almost always used to gain privilege, traverse infrastructure, and advance the goals of the breach. Unfortunately, these steps are rarely addressed by existing cyber …

TAG Cyber Security Annual 4th Quarter: PREVENTING AND DETECTING LATERAL MOVEMENT Read More »

Gula Tech logo

Gula Tech Adventures – Episode 23 – Tony Cole – Cyberdeception

Ron and Cyndi Gula interview Tony Cole, CTO at Attivo Networks, and speak about the use of cyber deception to thwart and frustrate hackers. We also speak about the cyber industry, Tony’s career in cybersecurity and some great works of science fiction influencing the industry. Transcript: Tony Cole: [00:19:30] Th-that’s a great point you’re making …

Gula Tech Adventures – Episode 23 – Tony Cole – Cyberdeception Read More »

American Security Today

Attivo Networks Honors Partners Driving Cybersecurity Innovation

Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, is pleased to announce that it has received four 2020 ‘ASTORS’ Homeland Security Awards from American Security Today. The company received a coveted 2020 Platinum ‘Extraordinary Leadership and Innovation Award’ for continued innovation in the field of advancing deception technology and advanced network …

Attivo Networks Honors Partners Driving Cybersecurity Innovation Read More »

MITRE Shield and Active Defense

En el pasado mes de septiembre la organización sin fines de lucro MITRE y quien es familiar en el medio de la seguridad informática por el reconocido “ATT&CK” (tácticas, técnicas y conocimiento común de adversarios), la cual es una herramienta muy apreciada en la comunidad de inteligencia de ciberamenazas para modelar las mismas incluyendo las …

MITRE Shield and Active Defense Read More »

Attivo extends the BOTsink family

Attivo Networks has added a model to its BOTsink family for network-based threat detection. Attivo’s BOTsink servers are designed to provide security officers with the ability to identify, analyze and combat network-based attacks. They complement Attivo’s EDN (Endpoint Detection Net) suite to combat attacks based on access data. Read the product news in LANline.

Attivo Networks to Host Webinar on Active Defense Capabilities of MITRE Shield

Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced it will host a webinar titled, “Mapping your Active Defense Capabilities to MITRE Shield.” Webinar hosts will be Tushar Kothari, chief executive officer of Attivo Networks and Edward Amoroso, chief executive officer of TAG Cyber. They will have a …

Attivo Networks to Host Webinar on Active Defense Capabilities of MITRE Shield Read More »

Cyber Deception Reduces Data Breach Costs by Over 51% and SOC Inefficiencies by 32%

New Report Identifies Financial Savings and Increased Productivity Based on Early Detection and Response Efficiency Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced the results of a new research report conducted with Kevin Fiscus of Deceptive Defense, Inc., “Cyber Deception Reduces Breach Costs & Increases SOC Efficiency.” …

Cyber Deception Reduces Data Breach Costs by Over 51% and SOC Inefficiencies by 32% Read More »

cyber deception

Insights into Using Cyber Deception

Written by: Carolyn Crandall, Chief Deception Officer – Over the past five years, the conversation around cyber deception has advanced from the question of what it is to what to use it for. Fundamentally, cyber deception has evolved into a highly regarded threat detection solution for companies of all sizes and security maturity levels. This blog outlines how the capabilities of deception technology have expanded and the various roles it can play within the security stack. This particular article aligns with the steps a responder will take in preparing for and responding to an attack.

CISO Mag logo

Lock Down the Endpoint with Cyber Deception

Every device that connects to a network creates a security risk. There are many forms of defenses designed to protect these endpoints including anti-virus, firewalls, HIPS, endpoint detection and response (EDR), and other forms of access control. Most of these solutions require installed agents to manage authorizations and authentication, track device activities, and detect and remove viruses and malware. Despite the efforts applied to endpoint protection and EDR solutions, it is inherently insufficient. Even if you could find every endpoint, manage every agent, and keep every device consistently patched, there are fundamentally too many attack vectors to keep up with.

Scroll to Top