Attivo Networks Blogs

Blogs

Tushar Kothari—Chief Executive Officer

Attivo Perspectives On New Gartner Deception Solution Comparison

Reading Time: 3 minutes  |  Published: August 4, 2019 in Attivo (Company), Award Wins, Blogs, Deception
0 Comments

I am pleased to share that Gartner’s newly released research report, Solution Comparison for Six Threat Deception Platforms is now available for subscribers. After months spent compiling research and product evaluations, the report goes into an extensive review on the breadth, depth, authenticity, and ease...

BlackHat2019

What to See and Do at Black Hat 2019

Reading Time: 6 minutes  |  Published: July 31, 2019 in Blogs, Event
0 Comments

Authored by: Carolyn Crandall, CMO & Chief Deception Officer - It’s that time of year, and Black Hat is back in town. Cybersecurity professionals (and from what I hear, clouds of grasshoppers) will soon be gathering in the Las Vegas desert. ...

Cyber Hygiene – What’s in your Network?

Reading Time: 3 minutes  |  Published: July 10, 2019 in Blogs, Deception, ThreatPath
0 Comments

Written by: Venu Vissamsetty, Vice-President of Security Research - Cyber Hygiene relates to the practice of keeping data safe and secure within the organization network. Organizations across the world are moving towards deploying IoT devices, adopting cloud computing as well as growing usage of applications which...

Deciphering Deception Believability

Reading Time: 6 minutes  |  Published: July 1, 2019 in Blogs, Deception
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer - Creating decoys that blend in seamlessly with the production environment is critical, as is one’s approach to deploying deception credential lures. There are a variety of different ways to deploy deception credentials and different levels of validation...

Reflecting on Infosecurity Mexico

Reading Time: 3 minutes  |  Published: June 7, 2019 in Blogs, Event
0 Comments

Written by: Mike Parkin, Technical Marketing Engineer -Each country has its own regulatory paradigms and cultural concerns, but the technical challenges are common for us all.  It doesn’t really matter where in the world we are.  Attackers are always trying to get past our defenses...

Attivo Networks ThreatDirect™ Deception in a Docker Container – Scaling with the Cisco Catalyst 9000 Family of Switches

Reading Time: 2 minutes  |  Published: June 5, 2019 in Blogs, Partner, ThreatDirect
0 Comments

Written by: Joseph Salazar, Technical Marketing Engineer - Networks are constantly evolving to meet the demands of ever-expanding digital business infrastructure.  Organizational networks can now include remote offices, branch offices, retail stores, or other sites outside of the headquarters network.  Users no longer need to...