Attivo Networks Blogs

Blogs

Detecting MITM attackers

On the Shoulders of Giants?

Reading Time: 3 minutes  |  Published: June 22, 2018 in Blogs, Deception, Guest Blog
0 Comments

Written by: Nick Palmer, Attivo Networks Technical Director, Europe I’ve come a long way in my view of more traditional security controls.  For the longest time, I labored under the misapprehension that endpoint solutions were just signature based and that SIEM solutions’ primary value was in retrospective...

Tony Cole -Chief Technology Officer

Why Deception Technology?

Reading Time: 3 minutes  |  Published: June 19, 2018 in Blogs, Deception
0 Comments

Written by: Tony Cole, Attivo Networks CTO There are a lot of questions around why deception technology is applicable to cyber defense. There are many insightful answers to this question. The most pertinent one is that it allows you to shrink adversary dwell time...

Key Detection Takeaways from the M-Trends Report. Hint: It’s not getting better.

Reading Time: 4 minutes  |  Published: June 14, 2018 in Blogs, Deception
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer and CMO Last week, we looked at the latest Verizon Data Breach Investigation Report, which outlined high-level trends across thousands of breaches and cybersecurity incidences. The report showed that despite organizations’ best efforts to get more proactive...

Verizon Data Breach Investigation Report Points to Growing Cybersecurity Threats and Failed Defenses

Reading Time: 4 minutes  |  Published: June 7, 2018 in Blogs, Cyber Breach
0 Comments

Written by: Carolyn Crandall, Attivo Networks Chief Deception Officer & CMO Today, we take a look into the annual Verizon Data Breach Investigation Report (DBIR) from Verizon Enterprise Solutions. The 2018 report examined over 53,000 incidents and 2,216 confirmed data breaches. As with past Verizon...

Looking Back on NH-ISAC ’18 Summit

Reading Time: 7 minutes  |  Published: May 30, 2018 in Blogs, Event, Healthcare, Survey
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer & CMO It was great to attend the NH-ISAC 2018 Spring Summit last week in Ponte Vedra Beach, FL as Grand Round Sponsors. This year’s conference was primarily focused on fostering and building relationships within the trusted healthcare...

Industrial Control System Cybersecurity is a Critical Component of Safety, So Why Do We Leave the Door Unlocked?

Reading Time: 3 minutes  |  Published: May 17, 2018 in Blogs, Energy
0 Comments

By: Tony Cole, CTO Humans are fallible. This is a fact I wish more people would understand, especially as it relates to software development. No human can code a somewhat sophisticated program perfectly while providing the requested capabilities without generally containing a certain number...

Detecting MITM attackers

Active Defense 101

Reading Time: 3 minutes  |  Published: May 11, 2018 in Blogs, Deception
0 Comments

By: Carolyn Crandall, Chief Deception Officer/CMO From Sun Tzu to George Washington, some of the greatest military strategists in history have lived by the philosophy that “the best defense is a good offense,” and the proverb also rings true when it comes to IT...