Attivo Networks News

lateral movement Tag

Playbook for Exercising Deception Based on MITRE ATT&CK® Framework

Reading Time: 5 minutes  |  Published: July 7, 2020 in Active Directory, Endpoint Protection, Incident Response, Pen Testing, Threat Detection, Threat Intelligence
0 Comments

Written by: Joe Carson, Sr. Director, Professional Services at Attivo Networks, Inc. - From time to time, I am asked to help a customer validate the efficacy of their deception implementation.  This can be part of a pilot deployment, or after full operationalization.  In many cases, organizations...

Attivo Networks ambushes attackers at the endpoint

Reading Time: 2 minutes  |  Published: June 1, 2020 in Attivo News
0 Comments

The Attivo Endpoint Detection Net product is tackling endpoint security challenges head-on by making every endpoint a decoy designed to disrupt an attacker’s ability to break out and further infiltrate the network. It does this without requiring agents on the endpoint or causing disruption to...

Detecting Attackers Exploiting IBM Data Risk Manager Vulnerabilities with Deception

Reading Time: 2 minutes  |  Published: May 1, 2020 in Blogs, Deception, Threat Detection
0 Comments

Written by: Venu Vissamsetty,VP Security Research, Founding Engineer Attivo Networks - Security Researcher Pedro Ribeiro from the Agile Information Security firm revealed that IBM Data Risk Manager contains four critical severity vulnerabilities, which an unauthenticated attacker can exploit over the network. Attackers can chain these vulnerabilities together...

Attivo Networks

Attivo Networks Tightens Detection Net on Attacker Lateral Movement

Reading Time: 4 minutes  |  Published: July 30, 2019 in Press Release
0 Comments

Company’s Innovations in Deception Technology Lock Down Endpoints, So Attackers Can’t Advance Fremont, CA, July 30, 2019 – Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today announced significant portfolio enhancements that effectively lock down the endpoint so that attackers cannot advance...

Cyber Hygiene – What’s in your Network?

Reading Time: 3 minutes  |  Published: July 10, 2019 in Blogs, Deception, ThreatPath
0 Comments

Written by: Venu Vissamsetty, Vice-President of Security Research - Cyber Hygiene relates to the practice of keeping data safe and secure within the organization network. Organizations across the world are moving towards deploying IoT devices, adopting cloud computing as well as growing usage of applications which...

Attivo Networks

Attivo Networks® Proves Deception Fools Attackers

Reading Time: 3 minutes  |  Published: October 6, 2017 in Press Release
0 Comments

Attivo Networks announced industry validations that Attivo Networks deception effectively fools attackers. Validating deception’s ability to serve as a reliable security control for closing in-network detection gaps, the company has released results of a penetration test conducted by a top computer forensics company that specializes...