infosec Blog Terms - Attivo Networks

infosec

What is deception technology

Deception technology, commonly referred to as cyber deception, is a category of security tools and techniques designed to detect and divert an attacker’s lateral movement once they are inside the network. Deception technology enables defenders to identify a wide variety of attack methods without relying on known signatures or pattern matching. The technology is known …

What is deception technology Read More »

Ohio InfoSec Summit

Central Ohio ISSA is an organization and community of over 350 members who are passionate about information security and technology, with the goal of educating and equipping our members and community to secure organizations and information.

Six benefits of initiating a deception strategy for IT security teams

Faced with an ever-increasing range of sophisticated cyber threats and evolving attack surfaces, IT security teams are adopting a new line of defense: deception. They recognise that, despite there being a range of security tools and services in place, cybercriminals are still managing to bypass them and gain entry to infrastructures. Clearly, a new approach …

Six benefits of initiating a deception strategy for IT security teams Read More »

Attivo Networks Logo

Attivo Networks® and Seminole State College of Florida® Partner to Bring Deception-based Technology Innovation to Students

New Initiative Aims to Help Close Global Cybersecurity Skills Gap Through Education and Training Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, and Seminole State College of Florida® today announced a joint initiative aimed at closing the global cybersecurity skills gap. Beginning Fall 2020, Seminole State College will be among the first …

Attivo Networks® and Seminole State College of Florida® Partner to Bring Deception-based Technology Innovation to Students Read More »

Not Another GDPR Comment

Many organisations have been able to address Articles 32 and 25 of GDPR, but many still struggle with Article 33. Numerous organisations have difficulty identifying if an incident happened and if it happened, they have trouble modifying their strategy to report within 72 hours. Previous directives from the EU 95/46 made no specific mention of data breaches and GDPR now sets a clear directive as to what constitutes a data breach, how the incident is to be reported and the substantial penalties for not complying. This has required businesses to reassess their technology and processes in order to understand their ability to detect, audit, and report breaches in compliance with GDPR. Closing these gaps, in many cases, requires the adoption of new technology to ensure that the attack is not only detected but also understood in a way that can explain the magnitude of the breach and the corrective actions to contain it. Whether it be access to budget, skills shortages, or otherwise, a fair amount of organisations remain hard-pressed to comply with this article if faced with a breach today.

valentine

Valentine Risks – Ode to Elizabeth Barrett Browning

Written by: Chris Roberts – Chief Security Strategist. We think of the Internet as our friend, we use it for social activities, to keep in contact with friends and family scattered across the globe. We use it to help others, to be helped by friends and strangers alike…so when someone sends us something our first instinct is to click it to open it…and that’s the point we lose. We lose our bank accounts; we lose our identity, our taxes and our life.

Attivo Networks Logo

Attivo Networks® Expands Senior Leadership Team, Announces Steve Troyer as New Vice President of Business Development

Attivo Networks today named Steve Troyer as the company’s vice president of business development. As a proven business development leader and technologist with more than 25 years in enterprise security, networking, and software, Troyer will continue to build out the company’s integration partner network in order to improve customers’ ability to quickly respond to and remediate threats.

Attivo Networks Logo

Attivo Networks Launches Counterintelligence; Bolsters Current Threat and Adversary Intelligence Functionality for Offense-driven Countermeasures

Attivo Networks® today introduced enhancements to its ThreatDefend deception and response platform, which is designed to deceive and reveal attackers that have bypassed perimeter security. The latest version of the ThreatDefend platform augments its current Threat and Adversary Intelligence gathering by adding Counterintelligence that identifies the types of data the attacker is attempting to steal and, through geolocation services, where the documents are being accessed. This information provides powerful insight that can be used to better understand the adversary and strengthen a company’s overall defenses.

Scroll to Top