Attivo Networks Blogs

Blogs

Looking Back on ILTA LegalSEC 2018

Reading Time: 3 minutes  |  Published: July 12, 2018 in Blogs, Deception, Legal
0 Comments

Written by: Christina Adams, Corporate Marketing Manager - Each year, hundreds of professionals come together at ILTA LegalSEC to find solutions for their toughest security challenges. One of the primary concerns raised was client confidentiality. It is absolutely critical to protect client data and law...

DARPA Gets Serious About Tackling Dwell Time

Reading Time: 2 minutes  |  Published: July 9, 2018 in Blogs, Deception, Research, Research, Threat Detection, Threat Research, Threat Research
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer and CMO - Dark Reading recently reported on a new Defense Advanced Research Projects Agency (DARPA)-funded research project at Georgia Tech aimed at reducing dwell time. The $12.8 million project, known as “Gnomon,” will look to establish new methods...

The ‘H’ word

Reading Time: 2 minutes  |  Published: July 6, 2018 in Blogs, Deception
0 Comments

Written by: Nick Palmer, Technical Director, Europe - Honeypot. I always liked the term.  Hailing right back to the comfort of my early childhood and images of Winnie the Pooh diving into one face first, then tracking to my first exposure to Lance Spitzner’s excellent book in...

Detecting MITM attackers

On the Shoulders of Giants?

Reading Time: 3 minutes  |  Published: June 22, 2018 in Blogs, Deception, Guest Blog
0 Comments

Written by: Nick Palmer, Attivo Networks Technical Director, Europe I’ve come a long way in my view of more traditional security controls.  For the longest time, I labored under the misapprehension that endpoint solutions were just signature based and that SIEM solutions’ primary value was in retrospective...

Tony Cole -Chief Technology Officer

Why Deception Technology?

Reading Time: 3 minutes  |  Published: June 19, 2018 in Blogs, Deception
0 Comments

Written by: Tony Cole, Attivo Networks CTO There are a lot of questions around why deception technology is applicable to cyber defense. There are many insightful answers to this question. The most pertinent one is that it allows you to shrink adversary dwell time...

Key Detection Takeaways from the M-Trends Report. Hint: It’s not getting better.

Reading Time: 4 minutes  |  Published: June 14, 2018 in Blogs, Deception
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer and CMO Last week, we looked at the latest Verizon Data Breach Investigation Report, which outlined high-level trends across thousands of breaches and cybersecurity incidences. The report showed that despite organizations’ best efforts to get more proactive...