Attivo Networks Blogs

Blogs

Lights, Cameras, Hack(tion)

Reading Time: 2 minutes  |  Published: March 15, 2017 in Blogs
0 Comments

It had all the makings of a blockbuster horror movie: Malicious actors, ineffective agents and plenty of cameras. However, in last week’s hack through thousands of IoT devices, the carnage was real. The irony here is that the surveillance cameras companies use to monitor events...

Measuring the Effectiveness of Your Security Controls

Reading Time: 4 minutes  |  Published: March 6, 2017 in Blogs, Threat Research
0 Comments

Performing regular assessments to determine the efficacy of security programs is foundational to understanding the reliability of programs, security gaps, compliance issues, and whether security technology is ending up as “shelfware”. To gain continued program support and funding, information security teams are expected to...

The Benefits of Deception for SCADA Environments

Reading Time: 3 minutes  |  Published: March 1, 2017 in Blogs, Energy
0 Comments

Written By: Carolyn Crandall, CMO & Chief Deception Officer -Recently, SC Magazine published an article covering several vulnerabilities that Positive Technologies found in GE supervisory control and data acquisition (SCADA) systems where an attacker could intercept passwords and disrupt utility and factory operations. While...

RSA Key Sessions for 2017

Reading Time: 3 minutes  |  Published: February 14, 2017 in Blogs
0 Comments

RSA 2017  is in full swing this week and there are a number of sessions that we are classifying as “must see”. We anticipate deception based detection technology to be covered both in formal meetings and information discussions during the conference. However, since...

Attivo Networks Adds ThreatOps™ to the ThreatMatrix™ Deception and Response Platform

Reading Time: 3 minutes  |  Published: February 9, 2017 in Blogs, ThreatOps
0 Comments

This week we announced that ThreatOps™ had been added to the Attivo ThreatMatrix™ Deception and Response Platform. The new ThreatOps solution is designed to accelerate incident response by automatically taking disparate attack information to correlate and display it within one dashboard where attacks can...