Attivo Networks Blogs

Attivo Networks Tag

Detecting MITM attackers

On the Shoulders of Giants?

Reading Time: 3 minutes  |  Published: June 22, 2018 in Blogs, Deception, Guest Blog
0 Comments

Written by: Nick Palmer, Attivo Networks Technical Director, Europe I’ve come a long way in my view of more traditional security controls.  For the longest time, I labored under the misapprehension that endpoint solutions were just signature based and that SIEM solutions’ primary value was in retrospective...

Tony Cole -Chief Technology Officer

Why Deception Technology?

Reading Time: 3 minutes  |  Published: June 19, 2018 in Blogs, Deception
0 Comments

Written by: Tony Cole, Attivo Networks CTO There are a lot of questions around why deception technology is applicable to cyber defense. There are many insightful answers to this question. The most pertinent one is that it allows you to shrink adversary dwell time...

Detecting MITM attackers

Active Defense 101

Reading Time: 3 minutes  |  Published: May 11, 2018 in Blogs, Deception
0 Comments

By: Carolyn Crandall, Chief Deception Officer/CMO From Sun Tzu to George Washington, some of the greatest military strategists in history have lived by the philosophy that “the best defense is a good offense,” and the proverb also rings true when it comes to IT...

Khaleej Times logo

How to get the better of cyber-criminals

Reading Time: < 1 minute  |  Published: April 2, 2018 in Attivo News
0 Comments

"The biggest threat posed by cyber-criminals today is their ability to remain undetected in the network for months, once they have bypassed perimeter defences," he said. "New technologies and approaches like deception-based threat detection will be one of the techniques and investments that organisations will...

Tony Cole -Chief Technology Officer

Why I Joined Attivo Networks

Reading Time: 3 minutes  |  Published: March 29, 2018 in Attivo (Company), Blogs, Deception
0 Comments

By: Tony Cole Earlier this month I joined Attivo Networks and a lot of friends and colleagues asked me, “Why move from a large public cybersecurity company to a startup?” The answer is pretty simple, because the technology actually works and closes a gap not...