Support Login
 

Resource Center

Welcome to the Attivo Resource Center. Here you will find resources to learn more about Attivo and Attivo threat detection solutions.

  • Categories

  • Format

Black Hat 2018: Election Hacking, Active Defense, and More…

Written by: Carolyn Crandall, CMO and Chief Deception Officer

And That’s a Wrap – Gartner Security and Risk Summit Recap

Written by: Carolyn Crandall, CMO & Chief Deception Officer

10 Security Projects CISOs Should Consider: Gartner Analyst

At last week’s Gartner Security Summit in National Harbor, Maryland, Gartner analyst Neil MacDonald outlined 10 cybersecurity projects that could go a long way toward reducing enterprise security risk.

Why Deception Technology?

Written by: Tony Cole, Attivo Networks CTO

 

Detection Budgets Rising Fast

Security budgets have shifted and are now split evenly between detection and prevention solutions.

The Art of Deception: Todd Holloway Marvell Semiconductor

Todd Holloway of Marvell Semiconductor discusses the Assumed Breach Posture

Manufacturer Protects Intellectual Property with the Attivo Deception Platform

Semiconductor company uses deception to add visibility into subnets that house their most critical data

Semiconductor Company Implements Deception to Stop Man-in-the-Middle Attacks

Semiconductor manufacturer adopts deception for real-time Man-in-the-Middle detection

How to Evaluate Deception Platforms and Checklist

An in-depth answer to the questions surrounding deception technology

Dear Locky: You have shown that signature-based detection is fundamentally impossible, but we still caught you!

Deception technology: catching the uncatchable

Deception Technology Comes of Age

What does it mean to be more than just a DecoyDoc?

Information Security: A Corporate Responsibility that goes beyond the CISO

Going beyond the CISO

New Attacks Highlight Need for a New Approach to Cyber Protection

Are current prevention techniques enough to stop modern cyber threats?

Ransomware… Because That’s Where the Money Is

As more cyber criminals flock to “where the money is”, how will you protect yourself?


Black Hat 2018: Election Hacking, Active Defense, and More…

Written by: Carolyn Crandall, CMO and Chief Deception Officer

And That’s a Wrap – Gartner Security and Risk Summit Recap

Written by: Carolyn Crandall, CMO & Chief Deception Officer

10 Security Projects CISOs Should Consider: Gartner Analyst

At last week’s Gartner Security Summit in National Harbor, Maryland, Gartner analyst Neil MacDonald outlined 10 cybersecurity projects that could go a long way toward reducing enterprise security risk.

Why Deception Technology?

Written by: Tony Cole, Attivo Networks CTO

 

Detection Budgets Rising Fast

Security budgets have shifted and are now split evenly between detection and prevention solutions.

The Art of Deception: Todd Holloway Marvell Semiconductor

Todd Holloway of Marvell Semiconductor discusses the Assumed Breach Posture

Manufacturer Protects Intellectual Property with the Attivo Deception Platform

Semiconductor company uses deception to add visibility into subnets that house their most critical data

Semiconductor Company Implements Deception to Stop Man-in-the-Middle Attacks

Semiconductor manufacturer adopts deception for real-time Man-in-the-Middle detection

How to Evaluate Deception Platforms and Checklist

An in-depth answer to the questions surrounding deception technology

Dear Locky: You have shown that signature-based detection is fundamentally impossible, but we still caught you!

Deception technology: catching the uncatchable

Deception Technology Comes of Age

What does it mean to be more than just a DecoyDoc?

Information Security: A Corporate Responsibility that goes beyond the CISO

Going beyond the CISO

New Attacks Highlight Need for a New Approach to Cyber Protection

Are current prevention techniques enough to stop modern cyber threats?

Ransomware… Because That’s Where the Money Is

As more cyber criminals flock to “where the money is”, how will you protect yourself?