Attivo Networks Blogs

Deception

Be Resilient: Using Cyber Deception to Combat Cyber Risk Following COVID-19

Reading Time: 7 minutes  |  Published: June 5, 2020 in Active Directory, Blogs, Deception, EDR, Threat Detection, Threat Intelligence
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer and CMO - I recently read the Gartner guidance document on being resilient to prepare for cyber risk following the COVID 19 breakout. I thought it would be interesting to look at their guidance and to see how...

Detecting Attackers Exploiting IBM Data Risk Manager Vulnerabilities with Deception

Reading Time: 2 minutes  |  Published: May 1, 2020 in Blogs, Deception, Threat Detection
0 Comments

Written by: Venu Vissamsetty,VP Security Research, Founding Engineer Attivo Networks - Security Researcher Pedro Ribeiro from the Agile Information Security firm revealed that IBM Data Risk Manager contains four critical severity vulnerabilities, which an unauthenticated attacker can exploit over the network. Attackers can chain these vulnerabilities together...

cyber deception

Insights into Using Cyber Deception

Reading Time: 4 minutes  |  Published: December 6, 2019 in Blogs, Deception
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer - Over the past five years, the conversation around cyber deception has advanced from the question of what it is to what to use it for. Fundamentally, cyber deception has evolved into a highly regarded threat detection solution for...

Tushar Kothari—Chief Executive Officer

Attivo Perspectives On New Gartner Deception Solution Comparison

Reading Time: 3 minutes  |  Published: August 4, 2019 in Attivo (Company), Award Wins, Blogs, Deception
0 Comments

I am pleased to share that Gartner’s newly released research report, Solution Comparison for Six Threat Deception Platforms is now available for subscribers. After months spent compiling research and product evaluations, the report goes into an extensive review on the breadth, depth, authenticity, and ease...

Cyber Hygiene – What’s in your Network?

Reading Time: 3 minutes  |  Published: July 10, 2019 in Blogs, Deception, ThreatPath
0 Comments

Written by: Venu Vissamsetty, Vice-President of Security Research - Cyber Hygiene relates to the practice of keeping data safe and secure within the organization network. Organizations across the world are moving towards deploying IoT devices, adopting cloud computing as well as growing usage of applications which...

Deciphering Deception Believability

Reading Time: 6 minutes  |  Published: July 1, 2019 in Blogs, Deception
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer - Creating decoys that blend in seamlessly with the production environment is critical, as is one’s approach to deploying deception credential lures. There are a variety of different ways to deploy deception credentials and different levels of validation...