Threat Intelligence

Playbook for Exercising Deception Based on MITRE ATT&CK® Framework

Reading Time: 5 minutes  |  Published: July 7, 2020 in Active Directory, Endpoint Protection, Incident Response, Pen Testing, Threat Detection, Threat Intelligence
0 Comments

Written by: Joe Carson, Sr. Director, Professional Services at Attivo Networks, Inc. - From time to time, I am asked to help a customer validate the efficacy of their deception implementation.  This can be part of a pilot deployment, or after full operationalization.  In many cases, organizations...

Be Resilient: Using Cyber Deception to Combat Cyber Risk Following COVID-19

Reading Time: 7 minutes  |  Published: June 5, 2020 in Active Directory, Blogs, Deception, EDR, Threat Detection, Threat Intelligence
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer and CMO - I recently read the Gartner guidance document on being resilient to prepare for cyber risk following the COVID 19 breakout. I thought it would be interesting to look at their guidance and to see how...

Using Deception to Proactively Prevent the Next Equifax Breach

Reading Time: 3 minutes  |  Published: September 21, 2017 in Blogs, Guest Blog, Research, Threat Intelligence, Threat Research
0 Comments

Equifax, one of the Big Three credit reporting bureaus that maintains sensitive personal and financial information on just about every adult (and many children) in America, recently revealed that it was the victim of a data breach. An estimated 143 million people had their information...

How to Evaluate Deception Platforms and Checklist

Reading Time: 6 minutes  |  Published: April 4, 2016 in Deception, Threat Detection, Threat Intelligence
0 Comments

By: Carolyn Crandall, CMO, Attivo NetworksWith over 700 reported breaches occurring annually, a modern day adaptive security approach requires a combination of prevention and detection technologies. Even the most state of the art prevention solutions cannot keep every attacker out. Being able to promptly detect threats...