Incident Response

Hottest new cybersecurity products at RSA 2019

This year’s RSA Conference is a key venue for companies to showcase their new cybersecurity products. Here are some of the more interesting tools to check out. The Informer is a deception-based, real time forensic collection offering that extends Attivo’s ThreatDefend Detection and Response platform. The new tool provides a view of the attacker’s activity to accelerate intelligence-driven response and remediation, enhancing the ability to rapidly gather, understand and disseminate adversary intelligence. RSAC Location: South Expo 455

Finance Monthly Game Changers Award 2019

Carolyn Crandall has served as the Chief Deception Officer and CMO of Attivo Networks® since 2015 and has over 30 years of experience building emerging technology markets in the security, networking, and storage industries. She has a demonstrated track record of successfully taking companies from preIPO through to multi-billion-dollar sales and has held leadership positions at Cisco, Juniper Networks, Nimble Storage, Riverbed, and Seagate(i365).

How organisations can adopt deception to outsmart cyber attackers

Dealing with cyberattacks on a daily basis has become the reality for businesses today. However, few organisations take a proactive response. Instead, they are left to deal with the fallout after an attack happens and the financial and reputational damage to their business has already occurred. TechRadar Pro spoke with Attivo Networks’ Chief Deception Officer Carolyn Crandall who suggests that businesses adopt the long established military technique of ‘deception’ to help them gain an edge over cybercriminals.

Deception technology: An approach that is beginning to gain traction

Data stolen in breaches years ago is still surfacing in financial crimes today, proving that getting over past breaches is hard to do. Simply doing more of the same won’t fix our current challenges.Just within the past six months, the secretary of the Department of Homeland Security (DHS) has been replaced, the White House has eliminated the position of cybersecurity coordinator on the National Security Council, the top three cybersecurity officials at the FBI have departed, several large-scale public sector breaches have occurred – including the City of Atlanta – and the primary elections were off to a rocky start as states and counties grappled with insecure systems and voter distrust.

Attivo Networks® Sweeps 2018 ‘ASTORS’ Taking Home 8 Homeland Security Awards

The company was honored with the coveted Extraordinary Leadership Award and 7 Technology Innovation Awards for its ThreatDefend™ Deception Platform. Attivo Networks® announced today that the company was recognized by American Security Today’s 2018 ‘ASTORS’ Homeland Awards with eight awards.

Attivo Networks

Attivo Networks showcases deception technology at GITEX

Deception technology turns the tables on cyberattackers with early and accurate detection and accelerated incident response. Dubai, United Arab Emirates, 14 October 2018: Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, will join Crestan International, a leading value added distributor, at GITEX Technology Week 2018 to highlight the critical role deception technology plays in an active defence strategy.

Carolyn Crandall—Chief Deception Officer/CMO

And That’s a Wrap – Gartner Security and Risk Summit Recap

Written by: Carolyn Crandall, CMO & Chief Deception Officer I always look forward to the Gartner Security and Risk Summit to hear their vision and insights into the future. Last year, I was not as inspired by the back to basics message, as it didn’t provide as much visibility into new innovation as I was seeking. This year was still a little light in the promotion of innovation, though I found usefulness in how they were trying to educate security professionals on what I will call “inspired thinking”.

Detecting MITM attackers

On the Shoulders of Giants?

Written by: Nick Palmer, Attivo Networks Technical Director, Europe I’ve come a long way in my view of more traditional security controls. For the longest time, I labored under the misapprehension that endpoint solutions were just signature based and that SIEM solutions’ primary value was in retrospective analysis of breaches, rather than threat hunting as augmented by relatively novel ideas like User Behavior Analytics (UBA).

Scroll to Top