survey Blog Terms - Attivo Networks

survey

Securing Endpoints is a Top Concern in Reducing Attack Dwell Times

Attivo Networks®, a leader in deception for cybersecurity threat detection, Triple Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, and a multiple product competitor in the 2020 ‘ASTORS’ Awards Program, has released new research report, titled “Top Threat Detection Trends.” The research highlights the top threat management challenges of cybersecurity professionals around the globe …

Securing Endpoints is a Top Concern in Reducing Attack Dwell Times Read More »

CISOs Weigh In: Detection Across Attack Surfaces Is their Top Priority

Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks – Earlier this year, we worked with SINC to conduct a study on the state of cybersecurity in the United States today. The research focused on companies with over 1,000 employees and over $25 million in annual sales, and respondents were CISOs, CIOs, Cybersecurity Directors, and other high-level security executives within a wide range of industries such as legal, education, entertainment, and healthcare. Our goal was to learn about the highest priority concerns for these executives, how they prioritize and evaluate their activities, and what tools and resources they employ.

Attivo Survey Reveals That Dwell Time Remains Alarmingly High

Authored by: Carolyn Crandall, CMO, and Chief Deception Officer – A couple of weeks ago, Attivo Networks released the findings from the company’s annual “Top Threat Detection Trends” survey, with data collected from over 1,200 security professionals across North America, LATAM, Europe, and Australia. Last year’s findings contained several interesting data points, including the fact that more than 50% of respondents indicated that 100 or more days of dwell time—the period from when an attacker enters the network to when the organization detects them—was an accurate representation of their organization. This is obviously concerning, as reducing organizational dwell times to limit how long an attacker has inside a network is a critical initiative of cybersecurity professionals everywhere, and we were interested to see how those numbers had evolved.

Attackers dwelling in compromised networks for months

Security teams are still struggling to cut down the time attackers spend infiltrating enterprise networks, with hackers routinely dwelling inside compromised networks for 100 days or more. … A survey conducted by Attivo Networks found that 64% of respondents felt that 100 days of dwell time — the timespan between an attacker entering a network …

Attackers dwelling in compromised networks for months Read More »

Businesses struggle to reduce hacker dwell time

Many firms don’t even track dwell time metrics. … One of the main challenges facing cybersecurity professionals is reducing hacker dwell time, according to a new report from Attivo Networks. Dwell time is described as the incubation period between the moment hackers compromise a network and when an attack is conducted – be it ransomware, …

Businesses struggle to reduce hacker dwell time Read More »

Top threat detection trends and challenges for cybersecurity professionals

User networks and endpoints are the biggest concerns for 65% of respondents, an 11% increase from last year, Attivo Networks reveals. … The report attributes this shift to four primary factors: the evolution of an increasingly perimeter-less environment; the sheer number of successful endpoint attacks; the rising cost per endpoint breach; and difficulties associated with …

Top threat detection trends and challenges for cybersecurity professionals Read More »

EMA

New Cyber Research Records a 91% Reduction in Dwell Time for Users of Deception Technology

Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today announced the availability of a new research report, conducted by Enterprise Management Associates (EMA) and commissioned by Attivo Networks, that explores attitudes and views of deception technology in the enterprise. The research uncovered material contrasts between users and non-users of deception technologies. One of the most significant findings is that users of deception technology reported a 12X improvement in the average number of days it takes to detect attackers operating within an enterprise network when compared to those unfamiliar with the technology.

Cloud Configurations Continue to Pose Data Center Security Challenges

According to an Attivo survey of security professionals conducted late last year, the cloud attack surface was the single greatest threat to enterprises. And a survey released earlier this year by Kansas-based security vendor Firemon revealed that 60% of those surveyed said their cloud deployments have accelerated past their ability to secure them.

informationmanagement-logo

Losing the cyber security war, more organizations beefing up detection efforts

The battle to keep cyber attackers from successfully compromising networks is not working, according to a recent report by threat detection company Attivo Networks. The company surveyed more than 450 cyber security professionals worldwide from August to December 2018, and more than half of the respondents reported that 100 days of dwell time or more was representative of their organization, while nearly half indicated that their mean time to detection was plateauing or increasing.

Scroll to Top