deception technology Blog Terms - Page 3 of 32 - Attivo Networks

deception technology

Attivo Networks® Sweeps 2020 Cybersecurity Excellence Awards, Garnering Six Product and Service Category Wins

FREMONT, Calif.–(BUSINESS WIRE)–Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today announced that it has been honored with six 2020 Cybersecurity Excellence Awards across several new cybersecurity product/service categories. These awards honor individuals and companies that demonstrate excellence, innovation, and leadership in information security.

Carolyn Crandall—Chief Deception Officer/CMO

Deception for Reducing Risk and Creating a Defender’s Advantage

By Carolyn Crandall, Chief Deception Officer at Attivo Networks – Deceiving the enemy into believing one is stronger than one actually is, manipulating them into taking self-defeating actions or tricking them into believing the costs of a military raid outweigh the spoils of victory, are tactics repeatedly used in warfare throughout history.

cyber deception

Insights into Using Cyber Deception

Written by: Carolyn Crandall, Chief Deception Officer – Over the past five years, the conversation around cyber deception has advanced from the question of what it is to what to use it for. Fundamentally, cyber deception has evolved into a highly regarded threat detection solution for companies of all sizes and security maturity levels. This blog outlines how the capabilities of deception technology have expanded and the various roles it can play within the security stack. This particular article aligns with the steps a responder will take in preparing for and responding to an attack.

Webinar: A New Way to Minimize Active Directory Security Risk

Connect with Chris Roberts, Chief Security Strategist of Attivo Networks and host Sarah Ashburn of Attivo Networks to hear about the company’s new ADSecure solution, which is designed to improve security to Active Directory (AD) and reduce risk. All, without interfering with the AD production environment. Reducing Active Directories Attack Footprint… • Let’s be frank…Active …

Webinar: A New Way to Minimize Active Directory Security Risk Read More »

Webinar: Is it really possible to lock down an endpoint? Yes, but not how you might think.

Tune in with Fernando Montenegro, Analyst at 451 Research, and Carolyn Crandall, Chief Deception Officer, and CMO at Attivo Networks, for an engaging discussion on the latest Endpoint Security research, challenges organizations are facing today, and why deception technology has created a winning strategy for locking down the endpoint Endpoints are the primary target of …

Webinar: Is it really possible to lock down an endpoint? Yes, but not how you might think. Read More »

Time to turn the tables on cyber-attackers

Outwitting one’s enemy has been a key element of warfare since the ancient Greeks began laying siege to the city of Troy. That 10-year mythological conflict was brought to a sudden end through the use of subterfuge in the form of a giant wooden horse, concealing an elite fighting force, which was wheeled into the citadel by the unsuspecting Trojans. More recently, the Allied nations employed an equally effective deception strategy to divert the German high command’s attention away from Normandy, the planned site of the 1944 invasion, which signalled the beginning of the end of World War II.

Webinar: Learn to SOAR with Deception Technology

Join us to learn how the Attivo Networks in-network deception technology can strengthen your existing Security Orchestration, Automation, and Response (SOAR) solution. SOAR addresses the issues that SOCs regularly deal with, such as the volume of alerts and a lack of experienced security personnel. The Attivo Networks ThreatDefend platform can help security teams address challenges …

Webinar: Learn to SOAR with Deception Technology Read More »

Scroll to Top