Data stolen in breaches years ago is still surfacing in financial crimes today, proving that getting over past breaches is hard to do. Simply doing more of the same won’t fix our current challenges.Just within the past six months, the secretary of the Department of Homeland Security (DHS) has been replaced, the White House has eliminated the position of cybersecurity coordinator on the National Security Council, the top three cybersecurity officials at the FBI have departed, several large-scale public sector breaches have occurred – including the City of Atlanta – and the primary elections were off to a rocky start as states and counties grappled with insecure systems and voter distrust.
Deception technology turns the tables on cyberattackers with early and accurate detection and accelerated incident response. Dubai, United Arab Emirates, 14 October 2018: Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, will join Crestan International, a leading value added distributor, at GITEX Technology Week 2018 to highlight the critical role deception technology plays in an active defence strategy.
Written by: Carolyn Crandall, CMO & Chief Deception Officer I always look forward to the Gartner Security and Risk Summit to hear their vision and insights into the future. Last year, I was not as inspired by the back to basics message, as it didn’t provide as much visibility into new innovation as I was seeking. This year was still a little light in the promotion of innovation, though I found usefulness in how they were trying to educate security professionals on what I will call “inspired thinking”.
Written by: Nick Palmer, Attivo Networks Technical Director, Europe I’ve come a long way in my view of more traditional security controls. For the longest time, I labored under the misapprehension that endpoint solutions were just signature based and that SIEM solutions’ primary value was in retrospective analysis of breaches, rather than threat hunting as augmented by relatively novel ideas like User Behavior Analytics (UBA).
An active defense is the use of offensive actions to outmaneuver an adversary and make an attack more difficult and to carry out. Slowing down or derailing the attacker so they cannot advance or complete their attack increases the probability that the attacker will make a mistake and expose their presence or reveal their attack vector.
Attivo Networks today named Steve Troyer as the company’s vice president of business development. As a proven business development leader and technologist with more than 25 years in enterprise security, networking, and software, Troyer will continue to build out the company’s integration partner network in order to improve customers’ ability to quickly respond to and remediate threats.
Attivo Networks® today introduced enhancements to its ThreatDefend deception and response platform, which is designed to deceive and reveal attackers that have bypassed perimeter security. The latest version of the ThreatDefend platform augments its current Threat and Adversary Intelligence gathering by adding Counterintelligence that identifies the types of data the attacker is attempting to steal and, through geolocation services, where the documents are being accessed. This information provides powerful insight that can be used to better understand the adversary and strengthen a company’s overall defenses.
Former FireEye CTO Tony Cole Sees the Lure of Deception Technology
Attivo Networks® today announced the appointment of Tony Cole as the company’s new Chief Technology Officer. A globally recognized cybersecurity expert, advisor and strategist, Cole joins to evangelize deception technology as global market demand increases for the company’s ThreatDefend early detection and active response solutions…