deception technology Blog Terms - Attivo Networks

deception technology

Deception Checklist: What to Look for in a Deception Technology Solution

Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks – In today’s quickly evolving threat landscape, perimeter defenses are no longer enough to keep attackers out. Firewalls and antivirus software still play a needed role in cybersecurity, but organizations require additional tools to detect and derail attackers once they have entered the network. Unfortunately, it is impossible to prevent 100% of attacks, which means today’s organizations must assume that their network has already been breached—and defend themselves accordingly.

Attivo Networks Partners With Department of Defense to Develop Cyber Deception, Defense Tool; Todd Helfrich Quoted

Attivo Networks, a provider of defense and deception technologies, is collaborating with the Department of Defense to deliver the latest active defense tools intended to support warfighters’ adversary management. The company said Thursday its ThreatDefend platform is designed to be capable of deploying attack intelligence to the Common Operating Picture and uses modernized deception and machine learning …

Attivo Networks Partners With Department of Defense to Develop Cyber Deception, Defense Tool; Todd Helfrich Quoted Read More »

Attivo Networks: Deception technology against ransomware

Firewalls and classic solutions for endpoint security are not enough to defend against increasingly sophisticated and targeted attacks against IT infrastructure and applications, warn the security specialists at Attivo Networks. Although this combination would offer a certain level of protection against common and simple malware attacks, more sophisticated and targeted attacks also require sophisticated detection …

Attivo Networks: Deception technology against ransomware Read More »

Want stronger cybersecurity? Start by improving east-west traffic detection

When it comes to stopping cyber attackers, most information security teams primarily concern themselves with north-south traffic. This traffic moves between an internal network and the broader internet, and it is where most security tools, including firewalls, intrusion detection and prevention tools, tend to focus their efforts. This line of thinking is understandable — to …

Want stronger cybersecurity? Start by improving east-west traffic detection Read More »

Improving IT security by deception

Cybercriminals have access to a broad range of tools and techniques, but they tend to share one common goal – they’re looking to make the biggest possible profit with the least amount of effort. As a result, they’re on the hunt for targets with potentially lucrative data stores but whose defences are easy to breach. …

Improving IT security by deception Read More »

Study: Early detection of intruders cuts costs by more than half

Companies that use deception technologies for the early detection of cyber attacks can reduce the costs caused by data theft by more than half (51%). This is the key finding of a new study that Attivo Networks conducted with Kevin Fiscus of Deceptive Defense. The report, “Cyber ​​Deception Reduces Breach Costs & Increases SOC Efficiency,” …

Study: Early detection of intruders cuts costs by more than half Read More »

Pacific Northwest National Lab

Enhancing OT Deception with Model Driven, High Fidelity Decoys

This webinar will present the capabilities developed by the Pacific Northwest National Laboratory and Attivo Networks collaboration under the Department of Energy Technology Commercialization Fund program to create enhanced deceptions for defense of critical infrastructure OT systems. Register now.

CDM Logo

There’s a Hole in Your Threat Detection Strategy—It’s Called East/West Traffic

One of the most popular targets for attackers, cybercriminals, and other bad actors is east/west network traffic. This is network traffic that originates from one internal host or network segment, and whose destination is another internal host or network segment. North/south traffic, on the other hand, moves from an internal network out to the Internet. …

There’s a Hole in Your Threat Detection Strategy—It’s Called East/West Traffic Read More »

DarkReadingLogo

Fake Data and Fake Information: A Treasure Trove for Defenders

No one wants to believe that fake data can influence them, but evidence of its impact is all around us. Studies have shown that fake news can influence how we vote, what we buy, who we support, and what we do. This can transpire through dedicated misinformation campaigns, deceptively edited videos, and the use of …

Fake Data and Fake Information: A Treasure Trove for Defenders Read More »

Using deception to improve cyber resilience by turning the tables on attackers

Throughout history, deception has been a critical component of military activities. … Now that most organizations are continuously targets of cyber attacks deception provides a way to stay ahead of cyber attacks instead of feeling like we’re always one step behind. Attivo Networks Chief Deception Officer Carolyn Crandall explains further… For years, the adage that …

Using deception to improve cyber resilience by turning the tables on attackers Read More »

Scroll to Top