Attivo Networks Blogs

Authenticity Tag

Our Readers Favorite Blogs of 2019

Reading Time: 4 minutes  |  Published: January 3, 2020 in Attivo (Company), Blogs
0 Comments

Written by: Mackenzie Blaisdell, Senior Manager of Online Programs - Whether you are still soaking up the last few moments of the holiday season with family and friends or you’re back in the office kicking it into full gear, let’s take a quick moment to...

Deciphering Deception Believability

Reading Time: 6 minutes  |  Published: July 1, 2019 in Blogs, Deception
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer - Creating decoys that blend in seamlessly with the production environment is critical, as is one’s approach to deploying deception credential lures. There are a variety of different ways to deploy deception credentials and different levels of validation...

obvious deception

Obviously, You Can’t Be Obvious

Reading Time: 2 minutes  |  Published: May 3, 2019 in Blogs, Deception
0 Comments

Written by: Mike Parkin, Product Marketing Engineer -  As deception technology has matured into a modern and effective security solution, vendors have pursued different techniques for creating decoys, lures, and the rest of the details that go into a deception platform.  One of the challenges...

Deception Technology: Authenticity and Why It Matters

Reading Time: 2 minutes  |  Published: December 13, 2018 in Attivo News
0 Comments

The over-arching goal for any cyber deception system is to create target computing and networking systems and infrastructure that will be indistinguishable by an adversary from actual assets – including both live production and test environments. While this would seem an obvious consideration, it turns...