deception Archives - Attivo Networks

deception

XDR Meets Identity Threat Detection and Response

XDR Meets Identity Threat Detection and Response (ITDR)

Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks – Endpoint security is a significant concern for today’s organizations and has only grown more complex with institutionalizing of hybrid working. Cybercriminals are also engaging in modern attack tactics that include reusing stolen credentials, exploiting zero-day vulnerabilities, employing ransomware, and exploiting trusted insiders. Unfortunately, it only …

XDR Meets Identity Threat Detection and Response (ITDR) Read More »

WSJ: Cyber Firm SentinelOne to Buy Attivo Networks for $616.5 Million

SentinelOne to Acquire Attivo Networks, Bringing Identity to XDR

SentinelOne Adds Leading Identity Threat Detection and Response (ITDR) Technology for Enterprise Zero Trust Adoption Expands SentinelOne’s total addressable market by $4 billion in the fast-growing, critical identity security category Extends Singularity XDR capabilities to identity-based threats across endpoint, cloud workloads, IoT devices, mobile, and data wherever it resides Highly differentiated identity security platform with …

SentinelOne to Acquire Attivo Networks, Bringing Identity to XDR Read More »

SENTINELONE® TO ACQUIRE ATTIVO NETWORKS

Attivo Networks to be Acquired by SentinelOne; the XDR Journey Continues!

Written by: Tushar Kothari, CEO Today marks an historic milestone for every member of the Attivo Networks family. I am incredibly proud to share that our company has agreed to be acquired by SentinelOne! An important and highly respected integration partner of ours since 2020, SentinelOne has quickly built a strong and trusted brand in …

Attivo Networks to be Acquired by SentinelOne; the XDR Journey Continues! Read More »

The 2022 cybersecurity predictions bonanza

We will start seeing specific APIs (application program interfaces) attacked in order to compromise the supply chain, as threat actors innovate and leverage new tools to exploit vulnerabilities. This will lead to larger scale data breaches. The human element in cyberattacks, such as falling victim to social engineering or insider threats, will be amplified as …

The 2022 cybersecurity predictions bonanza Read More »

Attivo Networks Detects Attack

Attivo Networks Detects Attack at Major Petrochemical Company

Cyber risk to industrial sectors has grown and accelerated dramatically, led by ransomware impacting industrial processes and new activity from adversaries targeting Industrial Control Systems (ICS).  According to a Dragos ICS Cybersecurity 2020 report, most of its services clients had no visibility into their ICS environments and many of their customers did not monitor for …

Attivo Networks Detects Attack at Major Petrochemical Company Read More »

Celebrating the 30th Anniversary of Honeypots

Celebrating the 30th Anniversary of Honeypots

Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks – The word “honeypot” has a specific connotation. Within the world of cybersecurity, it generally refers to a trap set for an attacker, designed to lure them into revealing their intent to attack the network. Unfortunately, it’s a word that also sounds outdated or could be viewed as complex with a high grief to reward ratio. However, this technology has come a long way since the early days of the honeypot in the 1990s. The ongoing cat-and-mouse game between attackers and defenders necessitates constant evolution and improvement, which means that the concepts behind honeypot technology are limited in value and will never have broad appeal – or so one might think!

Security Solutions logo

How to use deception and concealment to improve IT security

By Jim Cook, ANZ Regional Director, Attivo Networks. Making use of deceptive tactics has been the game plan of cybercriminals for years. Now organisations are turning the tables and using the same techniques as a form of defence. Used in conjunction with established security strategies, deception and concealment can significantly increase the resilience of IT …

How to use deception and concealment to improve IT security Read More »

Attivo Networks Wins Trust Award for Best Deception Technology at SC Awards 2021

FREMONT, Calif. – May 5, 2021 – Attivo Networks, the industry experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced that its ThreatDefend Platform was recognized as the top deception solution in the Trust Awards category at the 2021 SC Awards. The announcement was made online Monday, May 3, 2021 as …

Attivo Networks Wins Trust Award for Best Deception Technology at SC Awards 2021 Read More »

Scroll to Top