Attivo Networks News

deception technology Tag

Continuous innovation is the key to cyber safety

Reading Time: 2 minutes  |  Published: May 8, 2019 in Attivo News
0 Comments

Many drivers and passengers died because safety simply wasn’t a motivating factor in the design and creation of the automobile. Since then, a parade of features has been added to increase car safety. These initially included brakes and lap belts, then seatbelts, directional  blinkers, headlights,...

IoT World Today

The Difficulty of Gauging Health Care Cybersecurity Risk

Reading Time: 2 minutes  |  Published: May 3, 2019 in Attivo News
0 Comments

In 2016, the cybersecurity division of the U.S. Department of Homeland Security released a warning that a class of medical devices had a whopping 1,418 vulnerabilities. Admittedly, the devices in question were end-of-life versions of BD Pyxis SupplyStation health care inventory management system. But this...

raconteur-logo

Why digital oversight is so critical

Reading Time: < 1 minute  |  Published: April 29, 2019 in Attivo News
0 Comments

When digital transformation projects are well underway, significant risks remain. In a competitive business environment, companies are under increasing pressure to cut costs and improve efficiency. Over the last few years, this has resulted in a digital transformation drive with firms embracing technologies such as cloud, internet of...

CISO Magazine – Interview of Carolyn Crandall

Reading Time: 9 minutes  |  Published: April 26, 2019 in Attivo News
0 Comments

You have helmed several leadership roles in several companies. Tell us a bit about your journey from the marketing space to starting Marticulate and then becoming a Chief Deception Officer at Attivo. What was the transition like? From core marketing to core technology? I didn’t...

Why Threat Deception Technology Adoption is Soaring

Reading Time: 3 minutes  |  Published: April 22, 2019 in Attivo News
0 Comments

Unlike other security solutions, Attivo focuses on detecting the threats that have bypassed perimeter security controls, which all determined attackers eventually do. Highly authentic deception traps, along with data, application, and credential lures are deployed to attract an attacker into engaging and revealing their presence....