security strategy Blog Terms - Attivo Networks

security strategy

ctovisionlogo1

A Conversation with Leading Expert on The Use of Deception Technologies in Cybersecurity Tony Cole

In this OODAcast, OODA CTO Bob Gourley was joined by Tony Cole of Attivo Networks in an interactive discussion on the state of cybersecurity, with a focus on how deception technologies can be leveraged by organizations of all sizes to mitigate risks. … Tony is an icon in the cybersecurity community. He is known both …

A Conversation with Leading Expert on The Use of Deception Technologies in Cybersecurity Tony Cole Read More »

With 783 Breaches Reported in 2014, Isn’t it Time to Admit That Perimeter Defense is No Longer Enough

The scary part is that 783 breaches only represent what was reported. Undoubtedly many more incidents occurred but were never publically disclosed. Whether you count the disclosed or undisclosed number, it would be hard to argue the fact that cyber-attacks are growing in frequency and are getting increasingly more complex. Current security solutions are proving ineffective, and breaches continue to be a deadly threat to enterprises where valuable data can be compromised, often generating millions of dollars for the attackers.

Scroll to Top