Attivo Networks Blogs

Blogs

Customers Asked for CrowdStrike Integrations, so We Delivered

Reading Time: 3 minutes  |  Published: July 14, 2020 in Blogs, Incident Response, Partner, Uncategorized
0 Comments

Written by: Joseph Salazar, Technical Marketing Engineer - Attivo Networks actively solicits feedback from its customers for improvements and new features they want to see.  We regularly receive requests to integrate with particular technology solutions that allow customers to better leverage the Attivo ThreatDefend® platform...

Playbook for Exercising Deception Based on MITRE ATT&CK® Framework

Reading Time: 5 minutes  |  Published: July 7, 2020 in Active Directory, Endpoint Protection, Incident Response, Pen Testing, Threat Detection, Threat Intelligence
0 Comments

Written by: Joe Carson, Sr. Director, Professional Services at Attivo Networks, Inc. - From time to time, I am asked to help a customer validate the efficacy of their deception implementation.  This can be part of a pilot deployment, or after full operationalization.  In many cases, organizations...

Results Show Boost in APT Detection Rates with Attivo Endpoint Detection Net (EDN) Suite

Reading Time: 3 minutes  |  Published: June 18, 2020 in Blogs, EDR, Endpoint Protection
0 Comments

Written by: Marc Feghali, Co-founder and VP of Product Management - Detecting more tactics of the MITRE ATT&CK® Matrix for Enterprise and achieving broader coverage is demonstrable when you incorporate the Attivo EDN suite to any EPP/EDR solution. The EDN suite produced an average increase of 42%...

Be Resilient: Using Cyber Deception to Combat Cyber Risk Following COVID-19

Reading Time: 7 minutes  |  Published: June 5, 2020 in Active Directory, Blogs, Deception, EDR, Threat Detection, Threat Intelligence
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer and CMO - I recently read the Gartner guidance document on being resilient to prepare for cyber risk following the COVID 19 breakout. I thought it would be interesting to look at their guidance and to see how...

Detecting Attackers Exploiting IBM Data Risk Manager Vulnerabilities with Deception

Reading Time: 2 minutes  |  Published: May 1, 2020 in Blogs, Deception, Threat Detection
0 Comments

Written by: Venu Vissamsetty,VP Security Research, Founding Engineer Attivo Networks - Security Researcher Pedro Ribeiro from the Agile Information Security firm revealed that IBM Data Risk Manager contains four critical severity vulnerabilities, which an unauthenticated attacker can exploit over the network. Attackers can chain these vulnerabilities together...