• Categories

  • Format

Cost Savings of Deception Quantified

Watch this webinar with Kevin Fiscus of Deceptive Defense, Inc. and Carolyn Crandall the Chief Deception Officer and CMO of Attivo Networks where Kevin shares his research findings on the cost savings associated with deception technology.

9 Notable 2020 CISO Challenges – Are they the Same as Yours?

The world has changed in so many ways in 2020. Even with the best-laid plans and precautions, CISOs have had to quickly respond to the COVID-19 pandemic, revising strategies and transitioning from unprepared to prepared. Read on for a list of important things CISOs are tackling as they look to stay one step ahead in these rapidly changing times.

Securing The Enterprise When Employees Work Remotely

For various reasons, many companies are encouraging or being requiring to have employees to work from home. This shift in employees working in a less secure environment creates a significant opportunity for cybercriminals and reduces their time to compromise.

Threat Deception for the Legal Sector

Legal organizations are actively turning to deception technology as the preferred method for early and accurate detection of threats that have bypassed other security controls. Deception technology gives legal organizations the internal visibility often lacking in traditional security infrastructures. To learn more about what benefits the Attivo solution can offer to the legal sector, see our white paper.

10 Security Projects CISOs Should Consider: Gartner Analyst

At last week’s Gartner Security Summit in National Harbor, Maryland, Gartner analyst Neil MacDonald outlined 10 cybersecurity projects that could go a long way toward reducing enterprise security risk.

GDPR with Deceptive Technology Perspective

GDPR is The General Data Protection Regulation which will radically change the data usage and protection landscape when the document comes into force on May 25th, 2018.

Deception Technology—Much more than a Honeypot

This solution brief will detail the origins of honeypots, the logic behind them, and what features ultimately inhibited their universal adoption – followed by a look into what comprises present-day deception technology, how it has evolved, and the functionalities that are catalyzing worldwide deployment and adoption.

Discussion on Deception Webinar

Learn why deception is recognized as a top 2017 security technology to consider for detecting in-network threats.

Harnessing Unparalleled Visibility in Cyber Attack Investigations

Demo of advanced forensic analysis, reporting, and how prevention system integrations expedite remediation.

What’s Lurking Deep in Your Network

Advanced techniques for finding malware lurking in corporate domains, remote offices, data centers, and in the cloud.

Checklist for Evaluating Deception Platforms

What deception technology is and how it provides an effective solution for detecting in-network threats in real-time.

Know What is Lurking in Your Network

Find out how deception technology allows for in-network detection of advanced threats.

Deception for Attack Detection of IoT Devices

This document will address the security concerns with the latest in security for connected devices—deception technology.

Pre-emptive Spear Phishing Management

Learn why phishing is one of the top cyber attacks occurring, how it works, and the steps an organization can take to protect their employees.

The Role of Dynamic Deception in the Cyber Kill Chain

Learn about the challenges of today’s threat landscape and the opportunities to address holes in the cyber attack lifecycle.


Cost Savings of Deception Quantified

Watch this webinar with Kevin Fiscus of Deceptive Defense, Inc. and Carolyn Crandall the Chief Deception Officer and CMO of Attivo Networks where Kevin shares his research findings on the cost savings associated with deception technology.

9 Notable 2020 CISO Challenges – Are they the Same as Yours?

The world has changed in so many ways in 2020. Even with the best-laid plans and precautions, CISOs have had to quickly respond to the COVID-19 pandemic, revising strategies and transitioning from unprepared to prepared. Read on for a list of important things CISOs are tackling as they look to stay one step ahead in these rapidly changing times.

Securing The Enterprise When Employees Work Remotely

For various reasons, many companies are encouraging or being requiring to have employees to work from home. This shift in employees working in a less secure environment creates a significant opportunity for cybercriminals and reduces their time to compromise.

Threat Deception for the Legal Sector

Legal organizations are actively turning to deception technology as the preferred method for early and accurate detection of threats that have bypassed other security controls. Deception technology gives legal organizations the internal visibility often lacking in traditional security infrastructures. To learn more about what benefits the Attivo solution can offer to the legal sector, see our white paper.

10 Security Projects CISOs Should Consider: Gartner Analyst

At last week’s Gartner Security Summit in National Harbor, Maryland, Gartner analyst Neil MacDonald outlined 10 cybersecurity projects that could go a long way toward reducing enterprise security risk.

GDPR with Deceptive Technology Perspective

GDPR is The General Data Protection Regulation which will radically change the data usage and protection landscape when the document comes into force on May 25th, 2018.

Deception Technology—Much more than a Honeypot

This solution brief will detail the origins of honeypots, the logic behind them, and what features ultimately inhibited their universal adoption – followed by a look into what comprises present-day deception technology, how it has evolved, and the functionalities that are catalyzing worldwide deployment and adoption.

Discussion on Deception Webinar

Learn why deception is recognized as a top 2017 security technology to consider for detecting in-network threats.

Harnessing Unparalleled Visibility in Cyber Attack Investigations

Demo of advanced forensic analysis, reporting, and how prevention system integrations expedite remediation.

What’s Lurking Deep in Your Network

Advanced techniques for finding malware lurking in corporate domains, remote offices, data centers, and in the cloud.

Checklist for Evaluating Deception Platforms

What deception technology is and how it provides an effective solution for detecting in-network threats in real-time.

Know What is Lurking in Your Network

Find out how deception technology allows for in-network detection of advanced threats.

Deception for Attack Detection of IoT Devices

This document will address the security concerns with the latest in security for connected devices—deception technology.

Pre-emptive Spear Phishing Management

Learn why phishing is one of the top cyber attacks occurring, how it works, and the steps an organization can take to protect their employees.

The Role of Dynamic Deception in the Cyber Kill Chain

Learn about the challenges of today’s threat landscape and the opportunities to address holes in the cyber attack lifecycle.