Illustrating that while corporate directors are starting to look forward, protecting the value that their digital strategies and systems create is never far from mind. Tony Cole, CTO of Attivo Networks, said, “It’s time for company boards to understand that our economy is completely reliant on technology for operations. This means we require technology-savvy board …
“IoT-enabled device innovation will continue to outpace the security built into those devices and Federal government regulation will continue to inadequately define the laws and fines required to affect change. State-level regulations will be enacted to improve the situation, but will likely fall short in impact, and in many cases, only result in a false sense of consumer confidence with respect to the security of these devices”—Carolyn Crandall, Chief Deception Officer, Attivo Networks.
First impressions matter and that unquestionably includes the impressions created via written communications, says Carolyn Crandall, chief deception officer and chief marketing officer at Attivo Networks, a cybersecurity startup based in Fremont, California. “In today’s 140-character and text-based world, it’s easy to fall prey to sacrificing grammar or professionalism for convenience sake,” she says. “However, every message you send will reflect on you and the quality standard that you hold for your business.”
What these five strategies show is that, in essence, active defense is a playbook that puts security analysts in a position they are not often in: playing offense. Some of these techniques can be used outside of active defense, but they are more powerful when used collectively in an active defense context. It is likely that as the power of deception and active defense is well understood, deception will become a standard layer in most cybersecurity portfolios.