detection

Try the Award-Winning ADSecure Solution Free for 90-Days

Try the Award-Winning ADSecure Solution Free for 90-Days Start your 90-day free trial of the Attivo Networks ADSecure award-winning solution, ideal for organizations using Active Directory to authenticate and authorize users and computers in Windows domain networks. We Make it Easy and Simple No changes to Active Directory. Seamlessly integrate with your endpoint provider making …

Try the Award-Winning ADSecure Solution Free for 90-Days Read More »

Who is behind APT29? What we know about this nation-state cybercrime group

APT29 has been accused of targeting coronavirus vaccine organizations, but this is not the first time the group has attracted global attention … Who is behind APT29? What we know about this nation-state cybercrime group … Tony Cole, CTO at Attivo Networks, added: “It’s unfortunate that an actor such as APT29 with such sophisticated capabilities …

Who is behind APT29? What we know about this nation-state cybercrime group Read More »

Be Resilient: Using Cyber Deception to Combat Cyber Risk Following COVID-19

Written by: Carolyn Crandall, Chief Deception Officer and CMO – I recently read the Gartner guidance document on being resilient to prepare for cyber risk following the COVID 19 breakout. I thought it would be interesting to look at their guidance and to see how using Attivo deception technology can help.

Time to turn the tables on cyber-attackers

Outwitting one’s enemy has been a key element of warfare since the ancient Greeks began laying siege to the city of Troy. That 10-year mythological conflict was brought to a sudden end through the use of subterfuge in the form of a giant wooden horse, concealing an elite fighting force, which was wheeled into the citadel by the unsuspecting Trojans. More recently, the Allied nations employed an equally effective deception strategy to divert the German high command’s attention away from Normandy, the planned site of the 1944 invasion, which signalled the beginning of the end of World War II.

Attivo Networks ThreatDefend Platform’s Breakthrough Capabilities Extend Company’s Leadership Over Traditional Deception Technology

Company Receives Top Recognition for Next-Gen Technology in Cyber Defense Magazine’s Global 2019 Global Awards FREMONT, Calif. – October 24, 2019 – Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today revealed several proof points surrounding its deception technology innovation and market momentum, along with recognition of its technology leadership for “Next Gen Deception Based Security” in the Cyber Defense Magazine 2019 Global Awards. Earlier this year, Attivo Networks was also recognized as the market leader for deception-based security in the Cyber Defense Magazine 2019 InfoSec Awards.

Attivo Networks Named 2020 TAG Cyber Distinguished Vendor

FREMONT, Calif – Sept. 24, 2019 – Attivo Networks, the award-winning leader in deception for cybersecurity threat detection, announced today its selection by TAG Cyber as a Distinguished Vendor in this year’s 2020 Security Annual for the fourth consecutive year. Published each September, the report offers expert guidance, analysis, and education on 50 different aspects of the cybersecurity ecosystem, making it one of the most comprehensive and respected informational reports available in the industry.

The Art of Deception

In just a few years’ time, deception technology has matured to become a critical – and recommended – element of fundamental cybersecurity defense. Tony Cole of Attivo Networks discusses critical success factors for deploying deception. In a video interview at Information Security Media Group’s recent Cybersecurity Summit in New York, Cole discusses:

Attivo Networks® Technical Deception Engineer Joseph Salazar to Lead Presentation on Deception-Based Threat Detection at ILTACON 2019

Attivo Networks, the leader in deception technology, today announced that Joseph Salazar, Technical Deception Engineer, will lead a presentation titled, “Deception-based Threat Detection from a Legal Organization’s Perspective,” at ILTACON 2019 on August 20, 2019, at the Walt Disney World Swan Resort, Lake Buena Vista, Florida. ILTACON is the premier legal technology conference for professionals undertaking initiatives in support of the practice of law.

Securing IoT through deception

The momentum of IoT adoption is showing no signs of slowing, and with it comes increasingly material risk for both businesses and households. The quest for innovation has allowed for security to fall behind, and as a result, these devices have infiltrated our lives while creating an environment where attackers can exploit these solutions for anything from ransomware to extensive denial of service attacks, says Carolyn Crandall, chief deception officer at Attivo Networks.

Security controls must keep pace with internet-connected devices

Interconnected devices are becoming the standard across all facets of technology. We are seeing this in everything from smart cities to tea pots and toasters. New IoT devices are popping up daily, rapidly adding to the 23 billion that already exist. These devices are designed for availability, accuracy and efficient work. Unfortunately, unprecedented numbers of these devices are hitting the market with poor security access control and little to no management oversight, making them a prime target for cyberattack. The goal of an attack is to control the device, but more common and concerning are the new ways an attacker can use devices to gain access to corporate, medical or operational networks. As a result, organizations must change the way they approach their security controls. It is no longer feasible to assume a security team can find every endpoint device, much less secure them.

Scroll to Top