Support Login
 

deception technology Tag

What is Active Defense?

10:52 31 May in Attivo News
0 Comments

An active defense is the use of offensive actions to outmaneuver an adversary and make an attack more difficult and to carry out. Slowing down or derailing the attacker so they cannot advance or complete their attack increases the probability that the attacker will make a mistake and expose their presence or reveal...

Attivo Networks Logo

Attivo Networks Chief Deception Officer Carolyn Crandall to Present Alongside FBI Special Agent Jason Manar at Financial Services Information Sharing and Analysis Center Annual Summit

10:00 21 May in Press Release
0 Comments

Attivo Networks will present alongside the FBI at this year’s FS-ISAC Annual Summit, held May 20-23 in Boca Raton, Fla. This year’s event theme is Strength in Sharing and will focus on how to solve the challenges of the evolving threat landscape and support corporate...

ThreatPost-Logo-400x265-300

Podcast: The Evolution of Deception Technology

10:25 17 May in Attivo News
0 Comments

Deception technology is an emerging category of cyber defense that is particularly useful when it comes to IoT devices, SCADA systems and medical devices. Threatpost talks to Tony Cole, CTO of Attivo Networks, about how deception technology has evolved, the challenges behind and opportunities of...

pod2112-attivo

Pod 2112: Carolyn Crandall on Deceiving Hackers

13:48 16 May in Attivo News
0 Comments

Security professionals have long dismissed security by obscurity or attempts to hide information from hackers. In such schemes, hackers will sniff through the decoys and find the real assets. A new class of security technology – distributed deception – may change that thinking. Distributed deception...

Detecting MITM attackers

Active Defense 101

12:58 11 May in Blogs, Deception
0 Comments

By: Carolyn Crandall, Chief Deception Officer/CMO From Sun Tzu to George Washington, some of the greatest military strategists in history have lived by the philosophy that “the best defense is a good offense,” and the proverb also rings true when it comes to IT...

IDC Security Summit 2018

08:30 19 April in
0 Comments

Digital transformation is becoming increasingly mainstream, with the majority of organizations in the region either planning or already starting their journey. To assist this process, they have started using innovative technologies such as cognitive systems, virtual and augmented reality, robotics, and the Internet of Things...