deception Blog Terms - Attivo Networks

deception

Celebrating the 30th Anniversary of Honeypots

Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks – The word “honeypot” has a specific connotation. Within the world of cybersecurity, it generally refers to a trap set for an attacker, designed to lure them into revealing their intent to attack the network. Unfortunately, it’s a word that also sounds outdated or could be viewed as complex with a high grief to reward ratio. However, this technology has come a long way since the early days of the honeypot in the 1990s. The ongoing cat-and-mouse game between attackers and defenders necessitates constant evolution and improvement, which means that the concepts behind honeypot technology are limited in value and will never have broad appeal – or so one might think!

Attivo Networks Wins Trust Award for Best Deception Technology at SC Awards 2021

FREMONT, Calif. – May 5, 2021 – Attivo Networks, the industry experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced that its ThreatDefend Platform was recognized as the top deception solution in the Trust Awards category at the 2021 SC Awards. The announcement was made online Monday, May 3, 2021 as …

Attivo Networks Wins Trust Award for Best Deception Technology at SC Awards 2021 Read More »

Best Deception Technology | Attivo Networks ThreatDefend Platform

ThreatDefend protects against Active Directory enumeration and ransomware by hiding files, AD objects, folders, mapped network and cloud shares, and removable drives so attackers can’t find the data or access it for encryption. Attivo ThreatDefend offers value and ROI as an early detection system of attacker reconnaissance, credential harvesting, privilege escalation, and lateral movement, considerably …

Best Deception Technology | Attivo Networks ThreatDefend Platform Read More »

Finalists: Best Deception Technology

Most security experts advise against offensive tactics, or hack-back strategies, to deter malicious actors. But what businesses can do through select product offerings is lure those malicious actors away from valuable assets through technological trickery. Products recognized in this category automate the creation, deployment, and management of digital traps (decoys), lures and deceits, which are …

Finalists: Best Deception Technology Read More »

What is deception technology

Deception technology, commonly referred to as cyber deception, is a category of security tools and techniques designed to detect and divert an attacker’s lateral movement once they are inside the network. Deception technology enables defenders to identify a wide variety of attack methods without relying on known signatures or pattern matching. The technology is known …

What is deception technology Read More »

betanews

How the MITRE Shield can help organizations better address their adversaries [Q&A]

The MITRE ATT&CK framework is now used by many organizations to help them understand and counter threats. Less well known is the latest addition, MITRE Shield. [Beta News] spoke to Carolyn Crandall, chief deception officer and CMO at Attivo Networks to find out more about how this can be used along with MITRE ATT&CK to …

How the MITRE Shield can help organizations better address their adversaries [Q&A] Read More »

Why 2021 will be a big year for deception technology

New use cases, MITRE Shield support, and greater awareness will drive market growth and penetration. Ask any cybersecurity professional to define deception technology and they’ll likely talk about honeypots or honeynets. This is accurate but antiquated, as is the misconception that deception technology is complex, has limited use cases, and is only useful for security …

Why 2021 will be a big year for deception technology Read More »

3 Tricks to Safeguard Your Credentials and Prevent a Data Breach

Cybercriminals are growing more advanced. Many are well-funded, their tactics are increasingly cunning, and more and more of them use modern tools like AI to aid their efforts. So it might surprise many people to learn that one of the most successful tactics employed by cybercriminals remains credential theft. Too many organizations are leaving credentials …

3 Tricks to Safeguard Your Credentials and Prevent a Data Breach Read More »

Attivo BOTsink 7500

Attivo offers a new technique to further intensify the game of deception between attackers and defenders. The “Botsink” 7500 serves as a decoy, in English “bait”, to lure cyber criminals into the trap. Read the product news in DataCenter Insider.

Scroll to Top