Threat Intelligence

Playbook for Exercising Deception Based on MITRE ATT&CK® Framework

Reading Time: 5 minutes  |  Published: July 7, 2020 in Active Directory, Endpoint Protection, Incident Response, Pen Testing, Threat Detection, Threat Intelligence
0 Comments

Written by: Joe Carson, Sr. Director, Professional Services at Attivo Networks, Inc. - From time to time, I am asked to help a customer validate the efficacy of their deception implementation.  This can be part of a pilot deployment, or after full operationalization.  In many cases, organizations...

Be Resilient: Using Cyber Deception to Combat Cyber Risk Following COVID-19

Reading Time: 7 minutes  |  Published: June 5, 2020 in Active Directory, Blogs, Deception, EDR, Threat Detection, Threat Intelligence
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer and CMO - I recently read the Gartner guidance document on being resilient to prepare for cyber risk following the COVID 19 breakout. I thought it would be interesting to look at their guidance and to see how...

Using Deception to Proactively Prevent the Next Equifax Breach

Reading Time: 3 minutes  |  Published: September 21, 2017 in Blogs, Guest Blog, Research, Threat Intelligence, Threat Research
0 Comments

Equifax, one of the Big Three credit reporting bureaus that maintains sensitive personal and financial information on just about every adult (and many children) in America, recently revealed that it was the victim of a data breach. An estimated 143 million people had their information...

Uncertainty as a Goal of Deception in Cyber Security

Reading Time: 2 minutes  |  Published: September 8, 2016 in Attivo (Company), Blogs, Guest Blog, Partner, Research, Threat Detection, Threat Intelligence
0 Comments

By Dr. Edward G. Amoroso, Former SVP and CSO of AT&T; Current CEO of TAG Cyber, LLC. Imagine this: You are an evil cyber intruder, part of a criminal group targeting enterprise businesses for customer medical and financial records. Your goal is to quietly steal...

How to Evaluate Deception Platforms and Checklist

Reading Time: 6 minutes  |  Published: April 4, 2016 in Deception, Threat Detection, Threat Intelligence
0 Comments

By: Carolyn Crandall, CMO, Attivo Networks With over 700 reported breaches occurring annually, a modern day adaptive security approach requires a combination of prevention and detection technologies. Even the most state of the art prevention solutions cannot keep every attacker out. Being able to promptly detect threats...