Attivo Networks Blogs

Blogs

Deception and Counterintelligence

Reading Time: 4 minutes  |  Published: April 4, 2018 in Blogs, Deception
0 Comments

By: Joseph Salazar When someone mentions Counterintelligence (CI), James Bond, the IMF’s Ethan Hunt, and three letter agencies like the FBI, CIA, and MI5 come to mind for most people.  They may think that CI is limited only to intelligence agencies, government organizations, or the...

Tony Cole -Chief Technology Officer

Why I Joined Attivo Networks

Reading Time: 3 minutes  |  Published: March 29, 2018 in Attivo (Company), Blogs, Deception
0 Comments

By: Tony Cole Earlier this month I joined Attivo Networks and a lot of friends and colleagues asked me, “Why move from a large public cybersecurity company to a startup?” The answer is pretty simple, because the technology actually works and closes a gap not...

Looking back on Fortinet Accelerate 2018

Reading Time: 2 minutes  |  Published: March 8, 2018 in Blogs, Deception, Event
0 Comments

By: Helena Belem Kuly This year's Fortinet Accelerate 2018 global partner and user conference event in Las Vegas had a clear message according to Ken Xie, Fortinet's founder, CEO and Chairman of the Board, "At Fortinet we believe that the only way to achieve industry-leading impact...

Top 5 things to Know About New Securities and Exchange Commission Revised Guidance

Reading Time: 3 minutes  |  Published: February 28, 2018 in Blogs, Deception
0 Comments

By: Carolyn Crandall  The new SEC guidance builds upon the SEC’s 2011 cybersecurity guidance and is designed to assist publicly traded companies in preparing disclosures about cybersecurity risks and incidents. What it is: Guidance for promoting clearer and more robust disclosures so that more complete information can...

Urgent Care: Deception-Based Detection Stat!

Reading Time: 3 minutes  |  Published: February 22, 2018 in Blogs, Healthcare
0 Comments

By: Christina Adams  Healthcare organizations work hard to ensure their patients’ care and their sensitive data remain protected. Those working within the healthcare sector know the importance of optimizing care for their patients through the use of high-tech, state of the art medical devices and online...

The Olympic Destroyer Attack, What it was and Why it Should Have Been Detected

Reading Time: 4 minutes  |  Published: February 17, 2018 in Blogs, Deception, Entertainment, Event
0 Comments

 By: Mackenzie Blaisdell  While millions of viewers tuned in to watch the Winter Olympics opening ceremony in Pyeongchang, something ominous was occurring behind the scenes. Similar to the extensive planning that the Olympians put into preparing for the Olympics, threat actors had conducted in-depth research and...