Attivo Networks Blogs

Blogs

DarkVishnya-image

DarkVishnya: Attacking from the Inside – Again

Reading Time: 3 minutes  |  Published: January 4, 2019 in Blogs, Pen Testing
0 Comments

Written by: Mike Parkin, Attivo Networks Product Marketing Engineer - Once again, cyberattacks that rely on physical access have made headlines.  This time, the culprit is an attack dubbed DarkVishnya that came to light targeting banks in Eastern Europe. This sophisticated attack relies on intruders placing...

Protecting-against-cyberattacks

10 Ways to Protect Against Cyberattacks

Reading Time: 5 minutes  |  Published: December 14, 2018 in Blogs, Deception
0 Comments

Written by: Carolyn Crandall, Attivo Networks CMO and Chief Deception Officer - As the threat landscape continues to evolve, today’s security experts will emphasize that both perimeter security and active, in-network defenses are required to build a comprehensive cybersecurity solution. However,  they’ll also share that cyber hygiene is taking...

CISO

Las prioridades del CISO: La Visibilidad de la red

Reading Time: 4 minutes  |  Published: December 5, 2018 in Español
0 Comments

Escrito Por: Juan Vazquez, Gerente de Ventas Regionales - Uno de los problemas que añejamente han enfrentado las organizaciones respecto al tema de ciberseguridad, es la falta de visibilidad sobre la red interna y de manera muy particular la detección de ciber amenazas que se ignoran...

Tecnología Deception: Una solución simple mediante el engaño para las amenazas más complejas

Reading Time: 3 minutes  |  Published: November 15, 2018 in Español
0 Comments

Escrito por: Marc Feghali, Co-Fundador y Vicepresidente de gestión de producto - Es casi seguro que ha oído hablar de la tecnología denominada “Deception” para la ciberseguridad, pero se estará preguntando qué implica o puede ser requerido para implementarla en su entorno. Parece complejo ya que,...

Image of Tony Bradley - Proactive Defense

Deception Technology Provides a Proactive Defense that Gives You an Edge Over Attackers

Reading Time: 4 minutes  |  Published: November 8, 2018 in Blogs, Deception, Guest Blog
0 Comments

Written by: Tony Bradley, Senior Manager of Content Marketing for Alert Logic and Editor-in-Chief of TechSpective - Traditional cybersecurity is almost entirely reactive. You follow established best practices and implement security tools and processes and then you wait. You wait for an attacker you hope won’t...