Attivo Networks Blogs

Deception

Cyber Hygiene – What’s in your Network?

Reading Time: 3 minutes  |  Published: July 10, 2019 in Blogs, Deception, ThreatPath
0 Comments

Written by: Venu Vissamsetty, Vice-President of Security Research - Cyber Hygiene relates to the practice of keeping data safe and secure within the organization network. Organizations across the world are moving towards deploying IoT devices, adopting cloud computing as well as growing usage of applications which...

Deciphering Deception Believability

Reading Time: 6 minutes  |  Published: July 1, 2019 in Blogs, Deception
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer - Creating decoys that blend in seamlessly with the production environment is critical, as is one’s approach to deploying deception credential lures. There are a variety of different ways to deploy deception credentials and different levels of validation...

obvious deception

Obviously, You Can’t Be Obvious

Reading Time: 2 minutes  |  Published: May 3, 2019 in Blogs, Deception
0 Comments

Written by: Mike Parkin, Product Marketing Engineer -  As deception technology has matured into a modern and effective security solution, vendors have pursued different techniques for creating decoys, lures, and the rest of the details that go into a deception platform.  One of the challenges...

RDP imagery

Using Deception to Counter RDP Attacks

Reading Time: 2 minutes  |  Published: January 31, 2019 in Blogs, Deception
0 Comments

Written by: Mike Parkin, Product Marketing Engineer - A recent blog post by Ionut Arghire over at SecurityWeek highlighted both Remote Desktop Protocol (RDP) attacks, and attackers using obfuscation and encryption techniques to mask communication while they’re leveraging RDP.  It’s an interesting read and it...

Protecting-against-cyberattacks

10 Ways to Protect Against Cyberattacks

Reading Time: 5 minutes  |  Published: December 14, 2018 in Blogs, Deception
0 Comments

Written by: Carolyn Crandall, Attivo Networks CMO and Chief Deception Officer - As the threat landscape continues to evolve, today’s security experts will emphasize that both perimeter security and active, in-network defenses are required to build a comprehensive cybersecurity solution. However,  they’ll also share that cyber hygiene is taking...

Image of Tony Bradley - Proactive Defense

Deception Technology Provides a Proactive Defense that Gives You an Edge Over Attackers

Reading Time: 4 minutes  |  Published: November 8, 2018 in Blogs, Deception, Guest Blog
0 Comments

Written by: Tony Bradley, Senior Manager of Content Marketing for Alert Logic and Editor-in-Chief of TechSpective - Traditional cybersecurity is almost entirely reactive. You follow established best practices and implement security tools and processes and then you wait. You wait for an attacker you hope won’t...