Militaries have been using deception for millennia. Cybercriminals use it every day. But cybersecurity vendors are fighting back. Robert Scammell talks to Attivo Networks CTO Tony Cole to find out how military-inspired traps are snaring cyber threats before they get a chance to attack. During World War II, a ghost army fooled Adolf Hitler. A travelling roadshow of inflatable tanks, cannons and airplanes, largely manned by actors and artists, impersonated the Allied Army near the front line. Doing this drew attention away from the US troops, spreading the German forces thin and giving the Allies a tactical advantage.
Written by: Chris Roberts – Chief Security Strategist. We think of the Internet as our friend, we use it for social activities, to keep in contact with friends and family scattered across the globe. We use it to help others, to be helped by friends and strangers alike…so when someone sends us something our first instinct is to click it to open it…and that’s the point we lose. We lose our bank accounts; we lose our identity, our taxes and our life.
Attivo Networks has named FireEye veteran Tony Cole as its CTO as the company looks to boost its presence in the government, financial services, and oil and gas verticals. The Fremont, Calif.-based vendor brought Cole on board to help Attivo deliver more clarity to the market around how its platform is differentiated from competitors. Cole said he plans to take a deep dive into what the Attivo platform does and the capabilities it provides to ensure it’s continually growing.
As medical devices incorporate connectivity, they provide greater opportunities for convenience, service, and information for consumers and companies, but also are increasingly vulnerable to cyber threats. In this environment, Attivo Networks and Becton, Dickinson and Co. (BD) have validated a deception solution for medical technology cybersecurity threats through a partnership bringing Attivo’s Botsink solution to a select number of BD devices. The two firms collaborated through BD’s Product Security Partnership Program and created “mirror-match decoy authenticity” software for some of BD’s devices, a method designed to redirect an attack from reaching important information or networks.
“We welcome Attivo Networks to the BD Product Security Partnership Program as an important collaborator in our collective quest to improve cybersecurity across the health care industry,” said Rob Suarez, director of Product Security for BD. “The Attivo BOTsink solution was rigorously tested and validated by BD to tailor their protection technologies to work with our medical technologies, rather than being introduced as an afterthought.”
“It is an honor to win the popular vote and receive community validation for three Cybersecurity Excellence Awards. We appreciate the recognition of our deception technology innovation and impact to information security defense,” said Attivo Networks CEO, Tushar Kothari. “Attivo Networks is continuously committed to delivering our customers with the latest in technology required to build an active defense for today’s ever-changing threat landscape. This commitment has fueled our tremendous growth and we are excited to build upon this momentum in 2018.”
Attivo Networks® today announced a strategic investment by Singtel Innov8, the venture capital arm of the Singtel Group. The funding will be used to accelerate expansion into Asia Pacific markets with increased investment in sales, marketing and customer support operations in support of growing global deception technology customer base. Singtel Innov8 joins current investors Bain Capital Ventures, Omidyar Technology Ventures and Trident Capital Cybersecurity, who have collectively provided $47.5 million in funding to Attivo Networks.
Heightened attention to cybersecurity offensive countermeasures. Cybersecurity has been mostly defense-oriented, but this has never been sufficient. Moving forward, we will see more companies spring up along the lines of Attivo Networks, a leader in deception solutions. Attivo applies deception-based decoy and luring technologies within networks to misdirect attackers and deceive them into revealing themselves. (Disclosure: My firm has invested in Attivo.)
We go hands-on with some of the most innovative, useful and, arguably, best security tools from today’s most important cybersecurity technology categories.
Attivo addresses the one main weakness of most deception technology, having to rely on other programs to respond to an attack once revealed by the deception network. The Attivo platform offers quick response capabilities and the ability to interact with third-party programs for additional backup, configured using an intuitive drag and drop interface that requires very little training. After that, things like internal sandboxing and phishing e-mail protection are just icing on the cake of an already very impressive product.
Another key way to restack the deck in favor of organizational victims of cyber breaches is for them to embrace an offensive, as well as defensive stance against threat actors. Among the interesting players in this space is Attivo Networks, a leader in deception solutions for cybersecurity defense. Attivo develops traps and lures – called “honey nets” – to attract an attacker, which can be a human or a bot or an advanced persistent threat. Then it locks up the perpetrator in quarantine within the system and records actions and details for forensic analysis.