Attivo Networks Blogs

Blogs

Deciphering Deception Believability

Reading Time: 6 minutes  |  Published: July 1, 2019 in Blogs, Deception
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer - Creating decoys that blend in seamlessly with the production environment is critical, as is one’s approach to deploying deception credential lures. There are a variety of different ways to deploy deception credentials and different levels of validation...

Reflecting on Infosecurity Mexico

Reading Time: 3 minutes  |  Published: June 7, 2019 in Blogs, Event
0 Comments

Written by: Mike Parkin, Technical Marketing Engineer -Each country has its own regulatory paradigms and cultural concerns, but the technical challenges are common for us all.  It doesn’t really matter where in the world we are.  Attackers are always trying to get past our defenses...

Attivo Networks ThreatDirect™ Deception in a Docker Container – Scaling with the Cisco Catalyst 9000 Family of Switches

Reading Time: 2 minutes  |  Published: June 5, 2019 in Blogs, Partner, ThreatDirect
0 Comments

Written by: Joseph Salazar, Technical Marketing Engineer - Networks are constantly evolving to meet the demands of ever-expanding digital business infrastructure.  Organizational networks can now include remote offices, branch offices, retail stores, or other sites outside of the headquarters network.  Users no longer need to...

Combatting Triton Malware with Advanced Threat Detection

Reading Time: 2 minutes  |  Published: May 10, 2019 in Blogs, IoT
1 Comment

Written by: Mike Parkin, Technical Marketing Engineer - Malware targeting IoT devices is nothing new.  There have been some reasonably famous, or infamous, depending on your perspective, IoT targeted malware incidents.  An April article on ZDNetby Danny Palmer, on the Triton malware attack in late...

obvious deception

Obviously, You Can’t Be Obvious

Reading Time: 2 minutes  |  Published: May 3, 2019 in Blogs, Deception
0 Comments

Written by: Mike Parkin, Product Marketing Engineer -  As deception technology has matured into a modern and effective security solution, vendors have pursued different techniques for creating decoys, lures, and the rest of the details that go into a deception platform.  One of the challenges...

Recap of the CSO50 Conference

Reading Time: 2 minutes  |  Published: April 19, 2019 in Blogs, Event
0 Comments

Authored by: Carolyn Crandall, Attivo Networks CMO, and Chief Deception Officer - Last week, I had the honor of attending the CSO50 Conference, hosted by IDG’s CSO magazine. The conference brings together prominent figures in the cybersecurity industry to discuss best practices to address the ever-evolving...