Deception

Deciphering Deception Believability

10:02 01 July in Blogs, Deception
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer - Creating decoys that blend in seamlessly with the production environment is critical, as is one’s approach to deploying deception credential lures. There are a variety of different ways to deploy deception credentials and different levels of validation...

obvious deception

Obviously, You Can’t Be Obvious

10:59 03 May in Blogs, Deception
0 Comments

Written by: Mike Parkin, Product Marketing Engineer -  As deception technology has matured into a modern and effective security solution, vendors have pursued different techniques for creating decoys, lures, and the rest of the details that go into a deception platform.  One of the challenges...

RDP imagery

Using Deception to Counter RDP Attacks

08:57 31 January in Blogs, Deception
0 Comments

Written by: Mike Parkin, Product Marketing Engineer - A recent blog post by Ionut Arghire over at SecurityWeek highlighted both Remote Desktop Protocol (RDP) attacks, and attackers using obfuscation and encryption techniques to mask communication while they’re leveraging RDP.  It’s an interesting read and it...

Protecting-against-cyberattacks

10 Ways to Protect Against Cyberattacks

12:16 14 December in Blogs, Deception
0 Comments

Written by: Carolyn Crandall, Attivo Networks CMO and Chief Deception Officer - As the threat landscape continues to evolve, today’s security experts will emphasize that both perimeter security and active, in-network defenses are required to build a comprehensive cybersecurity solution. However,  they’ll also share that cyber hygiene is taking...