dwell time

It wire logo

Why COVID-19 has been good news for cybercriminals

The rush to have staff working remotely has created numerous opportunities for cybercriminals to infiltrate corporate networks. These opportunities are due to people no longer working within a protected infrastructure, using insecure networks, and connecting through client devices that lack vital security patches. It’s tempting for organisations to think that, because they have managed to …

Why COVID-19 has been good news for cybercriminals Read More »

illustrates cybersecurity reports

Recent Reports Shed Light on Today’s Cybersecurity Priorities

Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks – For those in the cybersecurity industry, the Verizon Data Breach Investigations Report (DBIR) is one of the most anticipated publications of the year. The report always includes interesting data and research, helping to shed light on some of the most important issues facing the cybersecurity industry today. The 2020 DBIR is no exception, but it is also not the only interesting report published within the past several months. FireEye Mandiant has also released its M-Trends 2020 report and its 2020 Security Effectiveness report, and—taken together rather than individually—these new reports provide real insight into the state of the industry. Below, you can find our top 10 takeaways.

Endpoints as Bait for Attackers

Attivo Networks has expanded the functionality of its ThreatDefend detection platform. These aim to anticipate an attacker’s behavior when it compromises a corporate network from an infected endpoint. ThreatDefend lures the attacker into an ambush if he moves in the network. The goal is to shorten the dwell time, i.e. the time span in which …

Endpoints as Bait for Attackers Read More »

Attivo Survey Reveals That Dwell Time Remains Alarmingly High

Authored by: Carolyn Crandall, CMO, and Chief Deception Officer – A couple of weeks ago, Attivo Networks released the findings from the company’s annual “Top Threat Detection Trends” survey, with data collected from over 1,200 security professionals across North America, LATAM, Europe, and Australia. Last year’s findings contained several interesting data points, including the fact that more than 50% of respondents indicated that 100 or more days of dwell time—the period from when an attacker enters the network to when the organization detects them—was an accurate representation of their organization. This is obviously concerning, as reducing organizational dwell times to limit how long an attacker has inside a network is a critical initiative of cybersecurity professionals everywhere, and we were interested to see how those numbers had evolved.

Attackers dwelling in compromised networks for months

Security teams are still struggling to cut down the time attackers spend infiltrating enterprise networks, with hackers routinely dwelling inside compromised networks for 100 days or more. … A survey conducted by Attivo Networks found that 64% of respondents felt that 100 days of dwell time — the timespan between an attacker entering a network …

Attackers dwelling in compromised networks for months Read More »

Businesses struggle to reduce hacker dwell time

Many firms don’t even track dwell time metrics. … One of the main challenges facing cybersecurity professionals is reducing hacker dwell time, according to a new report from Attivo Networks. Dwell time is described as the incubation period between the moment hackers compromise a network and when an attack is conducted – be it ransomware, …

Businesses struggle to reduce hacker dwell time Read More »

betanews

Deception technology speeds up detection of attacks

Users of deception technology report a 12X improvement in the average number of days it takes to detect attackers operating within an enterprise network. New research for Attivo Networks carried out by Enterprise Management Associates suggests attacker dwell times can be as low as 5.5 days with deception in use compared to an average of 78 to 100 days for those not using the technology.

EMA

New Cyber Research Records a 91% Reduction in Dwell Time for Users of Deception Technology

Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today announced the availability of a new research report, conducted by Enterprise Management Associates (EMA) and commissioned by Attivo Networks, that explores attitudes and views of deception technology in the enterprise. The research uncovered material contrasts between users and non-users of deception technologies. One of the most significant findings is that users of deception technology reported a 12X improvement in the average number of days it takes to detect attackers operating within an enterprise network when compared to those unfamiliar with the technology.

Attivo Networks

Attivo Networks® Introduces “The Informer,” a Deception-based Forensic Collection Solution

Enhancement to ThreatDefend™ Platform Delivers Adversary Intelligence, Dramatically Reducing a Defender’s Response and Remediation Time FREMONT, Calif. – February 12, 2019 – Attivo Networks today introduced the Informer solution, a deception-based forensic collection offering that delivers real-time forensics with enhanced visibility. As the latest expansion to the ThreatDefend™ Detection and Response platform, the Informer adds in-depth, and often hard-to-assemble views of the attacker’s activity to accelerate intelligence-driven response and remediation.

the-mercury-news

Setting traps for cyber-thieves with ‘deception technology’: Carolyn Crandall

These days it’s not enough to try to keep cyber-thieves and online spies out of your company’s network — there’s a good chance they’re already in. That’s the rationale behind “deception technology,” a sector of the cybersecurity business that grew out of the reality that no matter how good a firm’s “perimeter security” may be, a global army of extremely clever, morally compromised technologists is working diligently to break it.

Scroll to Top