Support Login

For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

I agree to these terms.

 

Blogs

Looking Back on ILTA LegalSEC 2018

15:08 12 July in Blogs, Deception, Legal
0 Comments

Written by: Christina Adams, Corporate Marketing Manager - Each year, hundreds of professionals come together at ILTA LegalSEC to find solutions for their toughest security challenges. One of the primary concerns raised was client confidentiality. It is absolutely critical to protect client data and law...

The ‘H’ word

10:32 06 July in Blogs, Deception
0 Comments

Written by: Nick Palmer, Technical Director, Europe - Honeypot. I always liked the term.  Hailing right back to the comfort of my early childhood and images of Winnie the Pooh diving into one face first, then tracking to my first exposure to Lance Spitzner’s excellent book in...

Detecting MITM attackers

On the Shoulders of Giants?

11:39 22 June in Blogs, Deception, Guest Blog
0 Comments

Written by: Nick Palmer, Attivo Networks Technical Director, Europe I’ve come a long way in my view of more traditional security controls.  For the longest time, I labored under the misapprehension that endpoint solutions were just signature based and that SIEM solutions’ primary value was in retrospective...

Tony Cole -Chief Technology Officer

Why Deception Technology?

14:26 19 June in Blogs, Deception
0 Comments

Written by: Tony Cole, Attivo Networks CTO There are a lot of questions around why deception technology is applicable to cyber defense. There are many insightful answers to this question. The most pertinent one is that it allows you to shrink adversary dwell time...