dwell time Blog Terms - Attivo Networks

dwell time

Why COVID-19 has been good news for cybercriminals

The rush to have staff working remotely has created numerous opportunities for cybercriminals to infiltrate corporate networks. These opportunities are due to people no longer working within a protected infrastructure, using insecure networks, and connecting through client devices that lack vital security patches. It’s tempting for organisations to think that, because they have managed to …

Why COVID-19 has been good news for cybercriminals Read More »

illustrates cybersecurity reports

Recent Reports Shed Light on Today’s Cybersecurity Priorities

Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks – For those in the cybersecurity industry, the Verizon Data Breach Investigations Report (DBIR) is one of the most anticipated publications of the year. The report always includes interesting data and research, helping to shed light on some of the most important issues facing the cybersecurity industry today. The 2020 DBIR is no exception, but it is also not the only interesting report published within the past several months. FireEye Mandiant has also released its M-Trends 2020 report and its 2020 Security Effectiveness report, and—taken together rather than individually—these new reports provide real insight into the state of the industry. Below, you can find our top 10 takeaways.

Endpoints as Bait for Attackers

Attivo Networks has expanded the functionality of its ThreatDefend detection platform. These aim to anticipate an attacker’s behavior when it compromises a corporate network from an infected endpoint. ThreatDefend lures the attacker into an ambush if he moves in the network. The goal is to shorten the dwell time, i.e. the time span in which …

Endpoints as Bait for Attackers Read More »

Attivo Survey Reveals That Dwell Time Remains Alarmingly High

Authored by: Carolyn Crandall, CMO, and Chief Deception Officer – A couple of weeks ago, Attivo Networks released the findings from the company’s annual “Top Threat Detection Trends” survey, with data collected from over 1,200 security professionals across North America, LATAM, Europe, and Australia. Last year’s findings contained several interesting data points, including the fact that more than 50% of respondents indicated that 100 or more days of dwell time—the period from when an attacker enters the network to when the organization detects them—was an accurate representation of their organization. This is obviously concerning, as reducing organizational dwell times to limit how long an attacker has inside a network is a critical initiative of cybersecurity professionals everywhere, and we were interested to see how those numbers had evolved.

Attackers dwelling in compromised networks for months

Security teams are still struggling to cut down the time attackers spend infiltrating enterprise networks, with hackers routinely dwelling inside compromised networks for 100 days or more. … A survey conducted by Attivo Networks found that 64% of respondents felt that 100 days of dwell time — the timespan between an attacker entering a network …

Attackers dwelling in compromised networks for months Read More »

Businesses struggle to reduce hacker dwell time

Many firms don’t even track dwell time metrics. … One of the main challenges facing cybersecurity professionals is reducing hacker dwell time, according to a new report from Attivo Networks. Dwell time is described as the incubation period between the moment hackers compromise a network and when an attack is conducted – be it ransomware, …

Businesses struggle to reduce hacker dwell time Read More »

Webinar: A New Way to Minimize Active Directory Security Risk

Connect with Chris Roberts, Chief Security Strategist of Attivo Networks and host Sarah Ashburn of Attivo Networks to hear about the company’s new ADSecure solution, which is designed to improve security to Active Directory (AD) and reduce risk. All, without interfering with the AD production environment. Reducing Active Directories Attack Footprint… • Let’s be frank…Active …

Webinar: A New Way to Minimize Active Directory Security Risk Read More »

Webinar: Is it really possible to lock down an endpoint? Yes, but not how you might think.

Tune in with Fernando Montenegro, Analyst at 451 Research, and Carolyn Crandall, Chief Deception Officer, and CMO at Attivo Networks, for an engaging discussion on the latest Endpoint Security research, challenges organizations are facing today, and why deception technology has created a winning strategy for locking down the endpoint Endpoints are the primary target of …

Webinar: Is it really possible to lock down an endpoint? Yes, but not how you might think. Read More »

betanews

Deception technology speeds up detection of attacks

Users of deception technology report a 12X improvement in the average number of days it takes to detect attackers operating within an enterprise network. New research for Attivo Networks carried out by Enterprise Management Associates suggests attacker dwell times can be as low as 5.5 days with deception in use compared to an average of 78 to 100 days for those not using the technology.

Scroll to Top