Attivo Networks News

Attivo News

What is Active Defense?

Reading Time: 2 minutes  |  Published: May 31, 2018 in Attivo News
0 Comments

An active defense is the use of offensive actions to outmaneuver an adversary and make an attack more difficult and to carry out. Slowing down or derailing the attacker so they cannot advance or complete their attack increases the probability that the attacker will make a mistake and expose their presence or reveal...

What is Counterintelligence?

Reading Time: < 1 minute  |  Published: May 30, 2018 in Attivo News
0 Comments

Counterintelligence (CI) is the information gathered and actions taken to identify and protect against an adversary’s knowledge collection activities or attempts to cause harm through sabotage or other actions. The goal of CI is to ensure information cannot be modified or destroyed by a malicious...

ThreatPost-Logo-400x265-300

Podcast: The Evolution of Deception Technology

Reading Time: < 1 minute  |  Published: May 17, 2018 in Attivo News
0 Comments

Deception technology is an emerging category of cyber defense that is particularly useful when it comes to IoT devices, SCADA systems and medical devices. Threatpost talks to Tony Cole, CTO of Attivo Networks, about how deception technology has evolved, the challenges behind and opportunities of...

pod2112-attivo

Pod 2112: Carolyn Crandall on Deceiving Hackers

Reading Time: < 1 minute  |  Published: May 16, 2018 in Attivo News
0 Comments

Security professionals have long dismissed security by obscurity or attempts to hide information from hackers. In such schemes, hackers will sniff through the decoys and find the real assets. A new class of security technology – distributed deception – may change that thinking. Distributed deception...

channel_partners_logo

Channel Partners New Services Roundup – April

Reading Time: < 1 minute  |  Published: May 8, 2018 in Attivo News
0 Comments

Attivo Networks enhanced its ThreatDefend platform designed to deceive and reveal attackers that have bypassed perimeter security. It added counterintelligence functionality to help companies identify the specific data attackers are seeking, as well as geolocation services that indicate where the documents are being accessed. The...