Threat Detection

Playbook for Exercising Deception Based on MITRE ATT&CK® Framework

Reading Time: 5 minutes  |  Published: July 7, 2020 in Active Directory, Endpoint Protection, Incident Response, Pen Testing, Threat Detection, Threat Intelligence
0 Comments

Written by: Joe Carson, Sr. Director, Professional Services at Attivo Networks, Inc. - From time to time, I am asked to help a customer validate the efficacy of their deception implementation.  This can be part of a pilot deployment, or after full operationalization.  In many cases, organizations...

Be Resilient: Using Cyber Deception to Combat Cyber Risk Following COVID-19

Reading Time: 7 minutes  |  Published: June 5, 2020 in Active Directory, Blogs, Deception, EDR, Threat Detection, Threat Intelligence
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer and CMO - I recently read the Gartner guidance document on being resilient to prepare for cyber risk following the COVID 19 breakout. I thought it would be interesting to look at their guidance and to see how...

Detecting Attackers Exploiting IBM Data Risk Manager Vulnerabilities with Deception

Reading Time: 2 minutes  |  Published: May 1, 2020 in Blogs, Deception, Threat Detection
0 Comments

Written by: Venu Vissamsetty,VP Security Research, Founding Engineer Attivo Networks - Security Researcher Pedro Ribeiro from the Agile Information Security firm revealed that IBM Data Risk Manager contains four critical severity vulnerabilities, which an unauthenticated attacker can exploit over the network. Attackers can chain these vulnerabilities together...

cybersecurity halloween

What Could be Coming to Haunt Your Organization this Halloween

Reading Time: 5 minutes  |  Published: October 31, 2018 in Blogs, Deception, Energy, Event, Government, Healthcare, High Tech, IoT, Ransomware, Threat Detection, ThreatDefend
0 Comments

Written by: Carolyn Crandall, Attivo Networks CMO - Halloween may be the only time of the year when monsters, vampires and ghosts parade the streets at night spooking the public. However, in the dark online world of sophisticated adversaries and expanding attack surfaces, threats continue to...

The USA Has More Breach Notification Laws than Baskin Robbins Has Ice Cream Flavors, Now What?  

Reading Time: 6 minutes  |  Published: October 22, 2018 in Blogs, Deception, Legal, Threat Detection
0 Comments

Written by: Carolyn Crandall, CMO & Chief Deception Officer - Since the original breach notification law enacted in California in 2002, each of the 50 states and District of Columbia, Puerto Rico, Guam, and the Virgin Islands, have all enacted breach notification laws that require organizations...

DARPA Gets Serious About Tackling Dwell Time

Reading Time: 2 minutes  |  Published: July 9, 2018 in Blogs, Deception, Research, Research, Threat Detection, Threat Research, Threat Research
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer and CMO - Dark Reading recently reported on a new Defense Advanced Research Projects Agency (DARPA)-funded research project at Georgia Tech aimed at reducing dwell time. The $12.8 million project, known as “Gnomon,” will look to establish new methods...

Attivo Networks Awarded Most Innovative Products by One Planet

Reading Time: 2 minutes  |  Published: February 4, 2017 in Attivo (Company), Award Wins, Blogs, BOTsink Solutions, Camouflage, Threat Detection, ThreatDefend, ThreatPath
0 Comments

While the year is only a few weeks old, Attivo Networks is starting 2017 off with several new achievements. Since the beginning of the year, we have announced an exciting new partnership with Check Point Software, released the results of our survey highlighting a dramatic...