Attivo Networks Blogs

Blogs

Cyber Hygiene – What’s in your Network?

Reading Time: 3 minutes  |  Published: July 10, 2019 in Blogs, Deception, ThreatPath
0 Comments

Written by: Venu Vissamsetty, Vice-President of Security Research - Cyber Hygiene relates to the practice of keeping data safe and secure within the organization network. Organizations across the world are moving towards deploying IoT devices, adopting cloud computing as well as growing usage of applications which...

Deciphering Deception Believability

Reading Time: 6 minutes  |  Published: July 1, 2019 in Blogs, Deception
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer - Creating decoys that blend in seamlessly with the production environment is critical, as is one’s approach to deploying deception credential lures. There are a variety of different ways to deploy deception credentials and different levels of validation...

Reflecting on Infosecurity Mexico

Reading Time: 3 minutes  |  Published: June 7, 2019 in Blogs, Event
0 Comments

Written by: Mike Parkin, Technical Marketing Engineer -Each country has its own regulatory paradigms and cultural concerns, but the technical challenges are common for us all.  It doesn’t really matter where in the world we are.  Attackers are always trying to get past our defenses...

Attivo Networks ThreatDirect™ Deception in a Docker Container – Scaling with the Cisco Catalyst 9000 Family of Switches

Reading Time: 2 minutes  |  Published: June 5, 2019 in Blogs, Partner, ThreatDirect
0 Comments

Written by: Joseph Salazar, Technical Marketing Engineer - Networks are constantly evolving to meet the demands of ever-expanding digital business infrastructure.  Organizational networks can now include remote offices, branch offices, retail stores, or other sites outside of the headquarters network.  Users no longer need to...

Combatting Triton Malware with Advanced Threat Detection

Reading Time: 2 minutes  |  Published: May 10, 2019 in Blogs, IoT
1 Comment

Written by: Mike Parkin, Technical Marketing Engineer - Malware targeting IoT devices is nothing new.  There have been some reasonably famous, or infamous, depending on your perspective, IoT targeted malware incidents.  An April article on ZDNetby Danny Palmer, on the Triton malware attack in late...

obvious deception

Obviously, You Can’t Be Obvious

Reading Time: 2 minutes  |  Published: May 3, 2019 in Blogs, Deception
0 Comments

Written by: Mike Parkin, Product Marketing Engineer -  As deception technology has matured into a modern and effective security solution, vendors have pursued different techniques for creating decoys, lures, and the rest of the details that go into a deception platform.  One of the challenges...