Attivo Networks Blogs

deception technology Tag

Detecting MITM attackers

On the Shoulders of Giants?

Reading Time: 3 minutes  |  Published: June 22, 2018 in Blogs, Deception, Guest Blog
0 Comments

Written by: Nick Palmer, Attivo Networks Technical Director, Europe I’ve come a long way in my view of more traditional security controls.  For the longest time, I labored under the misapprehension that endpoint solutions were just signature based and that SIEM solutions’ primary value was in retrospective...

Tony Cole -Chief Technology Officer

Why Deception Technology?

Reading Time: 3 minutes  |  Published: June 19, 2018 in Blogs, Deception
0 Comments

Written by: Tony Cole, Attivo Networks CTO There are a lot of questions around why deception technology is applicable to cyber defense. There are many insightful answers to this question. The most pertinent one is that it allows you to shrink adversary dwell time...

What is Active Defense?

Reading Time: 2 minutes  |  Published: May 31, 2018 in Attivo News
0 Comments

An active defense is the use of offensive actions to outmaneuver an adversary and make an attack more difficult and to carry out. Slowing down or derailing the attacker so they cannot advance or complete their attack increases the probability that the attacker will make a mistake and expose their presence or reveal...

ThreatPost-Logo-400x265-300

Podcast: The Evolution of Deception Technology

Reading Time: < 1 minute  |  Published: May 17, 2018 in Attivo News
0 Comments

Deception technology is an emerging category of cyber defense that is particularly useful when it comes to IoT devices, SCADA systems and medical devices. Threatpost talks to Tony Cole, CTO of Attivo Networks, about how deception technology has evolved, the challenges behind and opportunities of...