Attivo Networks Blogs

Guest Blog

Image of Tony Bradley - Proactive Defense

Deception Technology Provides a Proactive Defense that Gives You an Edge Over Attackers

Reading Time: 4 minutes  |  Published: November 8, 2018 in Blogs, Deception, Guest Blog
0 Comments

Written by: Tony Bradley, Senior Manager of Content Marketing for Alert Logic and Editor-in-Chief of TechSpective - Traditional cybersecurity is almost entirely reactive. You follow established best practices and implement security tools and processes and then you wait. You wait for an attacker you hope won’t...

Detecting MITM attackers

On the Shoulders of Giants?

Reading Time: 3 minutes  |  Published: June 22, 2018 in Blogs, Deception, Guest Blog
0 Comments

Written by: Nick Palmer, Attivo Networks Technical Director, Europe I’ve come a long way in my view of more traditional security controls.  For the longest time, I labored under the misapprehension that endpoint solutions were just signature based and that SIEM solutions’ primary value was in retrospective...

Using Deception to Proactively Prevent the Next Equifax Breach

Reading Time: 3 minutes  |  Published: September 21, 2017 in Blogs, Guest Blog, Research, Threat Intelligence, Threat Research
0 Comments

Equifax, one of the Big Three credit reporting bureaus that maintains sensitive personal and financial information on just about every adult (and many children) in America, recently revealed that it was the victim of a data breach. An estimated 143 million people had their information...

Uncertainty as a Goal of Deception in Cyber Security

Reading Time: 2 minutes  |  Published: September 8, 2016 in Attivo (Company), Blogs, Guest Blog, Partner, Research, Threat Detection, Threat Intelligence
0 Comments

By Dr. Edward G. Amoroso, Former SVP and CSO of AT&T; Current CEO of TAG Cyber, LLC. Imagine this: You are an evil cyber intruder, part of a criminal group targeting enterprise businesses for customer medical and financial records. Your goal is to quietly steal...