data security Blog Terms - Attivo Networks

data security

Channel Futures Logo

Data Manipulation: The Next Level of Cyberattacks

Today, cyberattacks aim to steal information or hijack infrastructure. While these threats are damaging enough, nation states and bad actors are not resting on their laurels. Next up in their nasty bag of tricks is blowing a hole in data integrity via unauthorized data changes, planting false information, changing sensor reads, and other data modifications and entanglements sure to create chaos and even death. While any data validation tool, such as blockchain, will likely prove helpful, tools that can spot and stop these attacks will be doubly so.

BioWorld MedTech Logo

BD and Attivo Partner to Thwart Cyberattacks

As medical devices incorporate connectivity, they provide greater opportunities for convenience, service, and information for consumers and companies, but also are increasingly vulnerable to cyber threats. In this environment, Attivo Networks and Becton, Dickinson and Co. (BD) have validated a deception solution for medical technology cybersecurity threats through a partnership bringing Attivo’s Botsink solution to a select number of BD devices. The two firms collaborated through BD’s Product Security Partnership Program and created “mirror-match decoy authenticity” software for some of BD’s devices, a method designed to redirect an attack from reaching important information or networks.

Attivo Networks Logo

Deception Technology Leader Attivo Networks Announces Investment from Singtel Innov8, Accelerating Global Expansion

Attivo Networks® today announced a strategic investment by Singtel Innov8, the venture capital arm of the Singtel Group. The funding will be used to accelerate expansion into Asia Pacific markets with increased investment in sales, marketing and customer support operations in support of growing global deception technology customer base. Singtel Innov8 joins current investors Bain Capital Ventures, Omidyar Technology Ventures and Trident Capital Cybersecurity, who have collectively provided $47.5 million in funding to Attivo Networks.

VCJ Logo

Cybersecurity in 2018: broader scope of innovation and bigger venture dollars

Heightened attention to cybersecurity offensive countermeasures. Cybersecurity has been mostly defense-oriented, but this has never been sufficient. Moving forward, we will see more companies spring up along the lines of Attivo Networks, a leader in deception solutions. Attivo applies deception-based decoy and luring technologies within networks to misdirect attackers and deceive them into revealing themselves. (Disclosure: My firm has invested in Attivo.)

Why Deception Technology Will Change The Game In Our Favor Against Cybercrime And Breaches

Then, I heard about Attivo and as one of the four CDM judges on our Infosec Awards from 2017, with them being one of our winners, receiving an overwhelming positive vote from the judges, I wanted to dig into what they are up to a little further and look at them within the purview of the Time-based Security model – could a solution like the Attivo ThreatDefendTM Deception and Response Platform actually deliver a way to slow down the breaches, because, frankly, we’re not yet going fast enough to stop them?

Security Now Logo

Startup Attivo Advocates for ‘Deceptive’ Security Protection

Is it next-generation threat detection? Is it counter-hacking? One thing we know is that it’s designed to lure hackers to a replica enterprise environment so that threats can be eliminated. It’s deception.

“Why does this company exist? It really boils down to that a perimeter-based defense is just not reliable anymore,” Carolyn Crandall, chief deception officer and CMO at Attivo Networks told Security Now. “People can and will get into the network, and over the last couple of years, people are accepting that.”

Crandall is adding her voice to a growing number of experts that agree the better strategy is to accept that penetration is inevitable and therefore the focus should be on protecting the data in the network, not erecting a fence.

Scroll to Top