Tony Cole, CTO of Attivo Networks and a former executive at FireEye, McAfee, and Symantec, told ZDNet that there were a variety of reasons behind the recent spate of ransomware attacks. Enterprises have an over-reliance on vendors and in general, organizations continue to add digital tools to their operations which increases the complexity of work for cybersecurity officials.
FREMONT, Calif. – Jan. 12, 2021 – PRLog — Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement detection, today announced it has been included in the list of Hot 150 Cybersecurity Companies To Watch in 2021 by Cybercrime Magazine for the second consecutive year. The list recognizes the most innovative companies in the cybersecurity market.
While financial services firms are increasingly embracing artificial intelligence (AI) and machine learning (ML) technologies, they’ve also captured cyber criminals’ attention. Never content to simply maintain the status quo, this group is busy putting the technologies to work to make their techniques stronger and more likely to succeed. AI and ML tools allow them to …
Hell hath no fury like the cybersecurity community during a pandemic. … As Covid-19 continues to spread around the planet, malicious hackers are pumping out scams that prey on people’s fear. They are flooding health agencies with traffic to slow their systems and even attacking the central nervous system of the planet’s coronavirus response – …
Company’s Innovations in Deception Technology Lock Down Endpoints, So Attackers Can’t Advance Fremont, CA, July 30, 2019 – Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today announced significant portfolio enhancements that effectively lock down the endpoint so that attackers cannot advance their attacks. These innovations include securing Active Directory and the ability to turn every endpoint into a network decoy.
Deception plays an essential role in any game of strategy, providing an opportunity to trick the opponent into exposing their weaknesses and leaving themselves vulnerable. Given its successes, the application of deceptive techniques has been a mainstay of military tactics, sports playbooks, and gambling for millennia. From tricking a unit of horsemen into overextending their charge to diverting a bomber squadron away from genuine targets, well-placed decoys have delivered powerful results in both offence and defence. Decoys, when paired with lures, can be indispensable in fooling an adversary into engaging or in misdirecting and slowing down their efforts.
“IoT-enabled device innovation will continue to outpace the security built into those devices and Federal government regulation will continue to inadequately define the laws and fines required to affect change. State-level regulations will be enacted to improve the situation, but will likely fall short in impact, and in many cases, only result in a false sense of consumer confidence with respect to the security of these devices”—Carolyn Crandall, Chief Deception Officer, Attivo Networks.