deception technology

Why Even the Best Cyber Security Solutions Fall Short

“A security solution is only as good as the weakest link” is one of those hackneyed phrases that keep popping up because it’s true. As the cyber attacks become increasingly sophisticated and numerous, the number of potential weak links also grows.

Weak links can span core parts of the security solution or areas peripheral to it. A core issue might be a firewall that the IT and security team deployed to protect a database, but is not equipped to block application-level attacks such as SQL injections.

Attivo Networks Signs Distributor Cloud Harmonics, Expands Access for Deception Security Solutions

Attivo Networks®, an innovator in information security threat detection, today announced a strategic distribution partnership with Cloud Harmonics, the leading cloud security solutions distributor. Attivo provides dynamic deception solutions to detect threats inside an organization’s enterprise, data center, and cloud environments in real-time. Cloud Harmonics provides channel partners with training, advanced services, and integrated technologies that add value to security, infrastructure, and cloud solutions.

A novel layer of security: Threat detection at Attivo Networks | #NXTWORK

Tushar Kothari, CEO of Attivo Networks, Inc., sat down with John Furrier and Stu Miniman, cohosts of theCUBE, from the SiliconANGLE Media team, during Juniper Networks NXTWORK 2015 to discuss Attivo’s unique security solution and integration with Juniper Networks, Inc.’s products, as well as the state of security among the industry.

Limits of Amazon Web Services Security Controls and the Need for Deception Technology

Amazon Web Services (AWS) offers a range of robust security controls but relying solely on AWS to ensure information security is a mistake. Amazon makes clear that public clouds entail a shared security model. Amazon will manage physical security, implement network security, lock down hypervisors, and provide tools, such as identity management services and virtual private clouds, for customers to use as needed. Customers, in turn, are responsible for implementing access control policies, monitoring systems, and assessing applications for vulnerabilities.

TalkTalk hit by data breach and ransom demand

TalkTalk announced that it has been the target of a data breach—its third such attack this year. Details are sketchy because the investigation just began and is still ongoing, but in a worst-case scenario it’s possible the attackers have accessed the entire customer database—compromising sensitive data on up to 4 million customers. TalkTalk also revealed that somebody claiming to be responsible for the hack has contacted the company with a ransom demand.

Deceit As A Defense Against Cyberattacks

Kelly Jackson Higgins

Oct 1, 2015

A new generation of ‘threat deception’ technology takes the decoydoc to a new, enterprise level.

It’s not technically hacking back, but it’s definitely a more aggressive way to defend your network. A wave of startups and established security firms are offering deception-based security technologies, a sort of next-generation, proactive decoydoc approach for enterprises.

Gartner calls this emerging sector “threat deception,” and predicts that 10% of all enterprises by 2018 will employ some form of deception tools and tactics against attackers. These virtual machine or appliance-based tools basically pose as legitimate members of the network–file servers, routers, switches, database servers, and even Internet of Things devices– typically near critical assets such as a point-of-sale system or a server as another layer of defense. They mimic the real system but also detect, analyze and disrupt an attack from getting to a real target.

“Wolf, Wolf, Wolf” – Too Much Crying, Not Enough Action

Remember hearing the stories of “The Little Boy Who Cried Wolf”? His calls for help created alarm among the townspeople until, ultimately, they got so used to false alarms they started ignoring his cries for attention. Now imagine multiple boys crying “wolf” at the same time. Are some real? Some false? How much time would it take to investigate each of these cries and would the real wolf attack while you were trying to react to every alarm? The magnitude of these cries quickly become an unfathomable nightmare and inevitably just becomes white noise.

Scroll to Top