Reconnaissance Blog Terms - Attivo Networks

Reconnaissance

Why 2021 will be a big year for deception technology

New use cases, MITRE Shield support, and greater awareness will drive market growth and penetration. Ask any cybersecurity professional to define deception technology and they’ll likely talk about honeypots or honeynets. This is accurate but antiquated, as is the misconception that deception technology is complex, has limited use cases, and is only useful for security …

Why 2021 will be a big year for deception technology Read More »

Attivo Networks Announces Endpoint Capabilities that Catch Attackers at Hello

Endpoint Detection Net Solution Raises the Lateral Movement Detection Bar, Detecting the Techniques that Other Security Controls Miss … Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, introduced today new capabilities to its Endpoint Detection Net (EDN) solution that prevent attackers from fingerprinting an endpoint to identify security weaknesses …

Attivo Networks Announces Endpoint Capabilities that Catch Attackers at Hello Read More »

illustrates cybersecurity reports

Recent Reports Shed Light on Today’s Cybersecurity Priorities

Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks – For those in the cybersecurity industry, the Verizon Data Breach Investigations Report (DBIR) is one of the most anticipated publications of the year. The report always includes interesting data and research, helping to shed light on some of the most important issues facing the cybersecurity industry today. The 2020 DBIR is no exception, but it is also not the only interesting report published within the past several months. FireEye Mandiant has also released its M-Trends 2020 report and its 2020 Security Effectiveness report, and—taken together rather than individually—these new reports provide real insight into the state of the industry. Below, you can find our top 10 takeaways.

Attivo Networks Detects In-Network Attack at Major Petrochemical Company

Written by: Carolyn Crandall, CMO & Chief Deception Officer – Most companies have invested heavily in perimeter defenses, but there remains a gap in detection, which leaves risk and exposure to attack. Internal network monitoring remains a challenging task, and while there are many ways to tackle this, most of them involve resource-intensive solutions. Whether it is monitoring all internal network traffic and looking for anomalies, deploying internal IDS sensors and hoping to get signature alerts, or using analytics to identify bad actors, many solutions require time, effort, and resources to implement, tune, and maintain, with no guarantee of accurate alerting with no false positives. A different approach is needed and this is where organizations are turning to deception technologies to help.

Scroll to Top