FREMONT, Calif. – July 7, 2021 – Attivo Networks®, the industry experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced it is hosting a webinar titled, “Cyber Strategies Talk with SolarWinds, Attivo Networks, and TAG Cyber CEOs.”
Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced its selection by TAG Cyber as a Distinguished Vendor in the 2021 Security Annual. The 2021 Security Annual is part of an annual series from TAG Cyber that is published each September since 2016. The report offers expert guidance, …
Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced it will host a webinar titled, “Mapping your Active Defense Capabilities to MITRE Shield.” Webinar hosts will be Tushar Kothari, chief executive officer of Attivo Networks and Edward Amoroso, chief executive officer of TAG Cyber. They will have a …
FREMONT, Calif – Sept. 24, 2019 – Attivo Networks, the award-winning leader in deception for cybersecurity threat detection, announced today its selection by TAG Cyber as a Distinguished Vendor in this year’s 2020 Security Annual for the fourth consecutive year. Published each September, the report offers expert guidance, analysis, and education on 50 different aspects of the cybersecurity ecosystem, making it one of the most comprehensive and respected informational reports available in the industry.
This article is fifth in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides an overview of how deception fits into information risk management strategies and how organizations can answer C-level ROI questions for justifying deception.
For many years, enterprise cyber security was primarily reactive. That is, a network perimeter was established to prevent attacks, and if a breach occurred, then response activities were initiated. Typical cyber response activities would include perimeter adjustments, vulnerability remediation, and damage containment. The methodology of prevent, detect, and respond (in that order) has thus driven cyber security design for most teams.
The over-arching goal for any cyber deception system is to create target computing and networking systems and infrastructure that will be indistinguishable by an adversary from actual assets – including both live production and test environments. While this would seem an obvious consideration, it turns out to be quite challenging technically to build such deception in practice. Except for Attivo Networks, others will attempt to do achieve this through emulation.
This article is first in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides an overview of the evolution of deception, including its use in the enterprise, with emphasis on the practical requirements that have emerged in recent years to counter the growing number and nature of malicious threats.
Attivo Networks® today announced the release of its Adaptive Deception Campaigns, which use machine-learning to create and automate the deployment of campaigns that bolster deceptions to address the evolving threat landscape and ever-changing attack surface. Adaptive campaigns are unique to other security controls in that they change the asymmetry of attacks with their ability to change the network “game board” automatically or on demand based on suspicion that an attack is underway. This new power to reset deception throughout global networks at whim, gives security teams the offensive control to force the attacker to start over, make a mistake, give up or incur increased time and costs in their attempt to breach the network.
Attivo Networks announced its designation as a Distinguished Vendor in this year’s 2018 TAG Cyber Security Annual for the second year running. The Annual is a practical handbook and reference guide, designed for the working cyber security professional, created from expert advisory research based on discussions, interviews, website material, and other information. The Distinguished Vendor recognition is an exclusive acknowledgement of companies that demonstrate unique innovation in addressing modern cyber security threats.