detection Blog Terms - Page 2 of 3 - Attivo Networks

detection

Attivo Networks® Technical Deception Engineer Joseph Salazar to Lead Presentation on Deception-Based Threat Detection at ILTACON 2019

Attivo Networks, the leader in deception technology, today announced that Joseph Salazar, Technical Deception Engineer, will lead a presentation titled, “Deception-based Threat Detection from a Legal Organization’s Perspective,” at ILTACON 2019 on August 20, 2019, at the Walt Disney World Swan Resort, Lake Buena Vista, Florida. ILTACON is the premier legal technology conference for professionals undertaking initiatives in support of the practice of law.

Securing IoT through deception

The momentum of IoT adoption is showing no signs of slowing, and with it comes increasingly material risk for both businesses and households. The quest for innovation has allowed for security to fall behind, and as a result, these devices have infiltrated our lives while creating an environment where attackers can exploit these solutions for anything from ransomware to extensive denial of service attacks, says Carolyn Crandall, chief deception officer at Attivo Networks.

Security controls must keep pace with internet-connected devices

Interconnected devices are becoming the standard across all facets of technology. We are seeing this in everything from smart cities to tea pots and toasters. New IoT devices are popping up daily, rapidly adding to the 23 billion that already exist. These devices are designed for availability, accuracy and efficient work. Unfortunately, unprecedented numbers of these devices are hitting the market with poor security access control and little to no management oversight, making them a prime target for cyberattack. The goal of an attack is to control the device, but more common and concerning are the new ways an attacker can use devices to gain access to corporate, medical or operational networks. As a result, organizations must change the way they approach their security controls. It is no longer feasible to assume a security team can find every endpoint device, much less secure them.

Digital-Defense-Shield-Frontline.CloudSM-4.4-298x300

Attivo Networks Integrates with Digital Defense Frontline.Cloud

Deception technology is a powerful tool to secure environments against advanced attackers and persistent threats, and it becomes even more powerful when it integrates with the rest of an organization’s security stack. The Attivo Networks ThreatDefend platform offers over 30 native integrations and has now been integrated with the Frontline.Cloud platform from Digital Defense.

AI cybersecurity awards

Attivo Networks® Wins Best Threat Detection and Best Cyber Deception Awards from Acquisition International

Fremont, CA – May 8, 2019 – Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today announced that Acquisition International has recognized the Attivo Networks ThreatDefend™ platform as the Most Advanced Threat Detection & Incident Response Platform in the 2019 Cyber Security Awards. Additionally, the company won a Corporate Excellence Award for Best Cybersecurity Deception Technology this year.

insider-threat-photo

Insider Threat – Tackling the Adversary Within

Written by: Mike Parkin – Product Marketing Engineer – I recently caught a webinar presented by ObserveIT that addressed the challenges presented by “insider threats.” They did a good job of defining the term, the threats, and they laid out some broad-stroke suggestions on how to address the problem. Something they didn’t talk about, was how deception technology is a powerful tool for dealing with this difficult problem.

Protecting-against-cyberattacks

10 Ways to Protect Against Cyberattacks

Written by: Carolyn Crandall, Attivo Networks CMO and Chief Deception Officer – As the threat landscape continues to evolve, today’s security experts will emphasize that both perimeter security and active, in-network defenses are required to build a comprehensive cybersecurity solution. However, they’ll also share that cyber hygiene is taking on greater importance as the scope, scale, and frequency of cyberattacks continue to grow.

Attivo Networks

Attivo Networks® Survey on Top Threat Detection Concerns and Trends Reveals Surprising Findings

Attivo Networks today announced the results of the company’s 2018 Top Threat Detection Concerns and Trends Survey. This survey reveals new insights about top information security concerns related to detecting and stopping attackers, identifying which technologies are impacting attackers, shifts in time to detection, and technologies being used to impact this change. The company surveyed more than 450 cybersecurity professionals and executives globally to gain insights into detection trends, top threat concerns, attack surface concerns, and what’s on their 2019 security wish list.

DARPA Gets Serious About Tackling Dwell Time

Written by: Carolyn Crandall, Chief Deception Officer and CMO – Dark Reading recently reported on a new Defense Advanced Research Projects Agency (DARPA)-funded research project at Georgia Tech aimed at reducing dwell time. The $12.8 million project, known as “Gnomon,” will look to establish new methods for faster threat detection and network cleanup. Funding for this kind of project could not come at a more critical time.

Detection Budgets Rising Fast

This blog has regularly covered the alarming rise in security breaches over the last two years, and the assumption that most security teams are now aware that their prevention solutions are not enough to protect their companies. One measure organizations are taking is the shift in spending on detection solutions versus prevention solutions. In fact, a number of analyst firms have indicated that this balance would be closer to 70/30 in 2017 and would take several more years to hit 60/40.

Scroll to Top