detection Tag

The Art of Deception

15:11 05 September in Attivo News
0 Comments

In just a few years' time, deception technology has matured to become a critical - and recommended - element of fundamental cybersecurity defense. Tony Cole of Attivo Networks discusses critical success factors for deploying deception. In a video interview at Information Security Media Group's recent...

Attivo Networks® Technical Deception Engineer Joseph Salazar to Lead Presentation on Deception-Based Threat Detection at ILTACON 2019

06:00 19 August in Press Release
0 Comments

Attivo Networks, the leader in deception technology, today announced that Joseph Salazar, Technical Deception Engineer, will lead a presentation titled, “Deception-based Threat Detection from a Legal Organization’s Perspective,” at ILTACON 2019 on August 20, 2019, at the Walt Disney World Swan Resort, Lake Buena Vista,...

Securing IoT through deception

13:39 08 August in Attivo News
0 Comments

The momentum of IoT adoption is showing no signs of slowing, and with it comes increasingly material risk for both businesses and households. The quest for innovation has allowed for security to fall behind, and as a result, these devices have infiltrated our lives while creating...

AI cybersecurity awards

Attivo Networks® Wins Best Threat Detection and Best Cyber Deception Awards from Acquisition International

06:00 08 May in Awards, Company Awards, Press Release, Technology Awards
0 Comments

Fremont, CA – May 8, 2019 – Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today announced that Acquisition International has recognized the Attivo Networks ThreatDefend™ platform as the Most Advanced Threat Detection & Incident Response Platform in the 2019 Cyber Security Awards. Additionally, the...

Protecting-against-cyberattacks

10 Ways to Protect Against Cyberattacks

12:16 14 December in Blogs, Deception
0 Comments

Written by: Carolyn Crandall, Attivo Networks CMO and Chief Deception Officer - As the threat landscape continues to evolve, today’s security experts will emphasize that both perimeter security and active, in-network defenses are required to build a comprehensive cybersecurity solution. However,  they’ll also share that cyber hygiene is taking...