Ed Amoroso Blog Terms - Attivo Networks

Ed Amoroso

Attivo Networks Named 2021 TAG Cyber Distinguished Vendor

Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced its selection by TAG Cyber as a Distinguished Vendor in the 2021 Security Annual. The 2021 Security Annual is part of an annual series from TAG Cyber that is published each September since 2016. The report offers expert guidance, …

Attivo Networks Named 2021 TAG Cyber Distinguished Vendor Read More »

Attivo Networks to Host Webinar on Active Defense Capabilities of MITRE Shield

Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced it will host a webinar titled, “Mapping your Active Defense Capabilities to MITRE Shield.” Webinar hosts will be Tushar Kothari, chief executive officer of Attivo Networks and Edward Amoroso, chief executive officer of TAG Cyber. They will have a …

Attivo Networks to Host Webinar on Active Defense Capabilities of MITRE Shield Read More »

Attivo Networks Named 2020 TAG Cyber Distinguished Vendor

FREMONT, Calif – Sept. 24, 2019 – Attivo Networks, the award-winning leader in deception for cybersecurity threat detection, announced today its selection by TAG Cyber as a Distinguished Vendor in this year’s 2020 Security Annual for the fourth consecutive year. Published each September, the report offers expert guidance, analysis, and education on 50 different aspects of the cybersecurity ecosystem, making it one of the most comprehensive and respected informational reports available in the industry.

Deception for proactive defense

For many years, enterprise cyber security was primarily reactive. That is, a network perimeter was established to prevent attacks, and if a breach occurred, then response activities were initiated. Typical cyber response activities would include perimeter adjustments, vulnerability remediation, and damage containment. The methodology of prevent, detect, and respond (in that order) has thus driven cyber security design for most teams.

Deception Technology: Authenticity and Why It Matters

The over-arching goal for any cyber deception system is to create target computing and networking systems and infrastructure that will be indistinguishable by an adversary from actual assets – including both live production and test environments. While this would seem an obvious consideration, it turns out to be quite challenging technically to build such deception in practice. Except for Attivo Networks, others will attempt to do achieve this through emulation.

An introduction to deception technology

This article is first in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides an overview of the evolution of deception, including its use in the enterprise, with emphasis on the practical requirements that have emerged in recent years to counter the growing number and nature of malicious threats.

Attivo Networks® Announces Adaptive Deception Campaigns Delivering Operational Agility to Outmaneuver Attackers

Attivo Networks® today announced the release of its Adaptive Deception Campaigns, which use machine-learning to create and automate the deployment of campaigns that bolster deceptions to address the evolving threat landscape and ever-changing attack surface. Adaptive campaigns are unique to other security controls in that they change the asymmetry of attacks with their ability to change the network “game board” automatically or on demand based on suspicion that an attack is underway. This new power to reset deception throughout global networks at whim, gives security teams the offensive control to force the attacker to start over, make a mistake, give up or incur increased time and costs in their attempt to breach the network.

Attivo Networks Named a 2018 TAG Cyber Distinguished Vendor

Attivo Networks announced its designation as a Distinguished Vendor in this year’s 2018 TAG Cyber Security Annual for the second year running. The Annual is a practical handbook and reference guide, designed for the working cyber security professional, created from expert advisory research based on discussions, interviews, website material, and other information. The Distinguished Vendor recognition is an exclusive acknowledgement of companies that demonstrate unique innovation in addressing modern cyber security threats.

Scroll to Top