Industry News Blogs - Page 47 of 58 - Attivo Networks

C-suite take note: there’s more to IT security than keeping you safe

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text] After the year of the breach in 2014, IT security still seems to be ...
Read More

Why the healthcare industry badly needs a cyber security health check

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text] After a slew of data breaches in 2014, the FBI warned the healthcare industry ...
Read More

The growing need for more women cybersleuths

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text] Amid high-profile breaches on websites such as Ashley Madison and the IRS, experts say ...
Read More

New report finds 90 per cent of organisations have suffered a security breach

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text]A new survey of security executives at large companies in the US reveals that many ...
Read More

Sharing Cyber Intelligence To Fight Cyber Crime And Fraud-as-a-Service (FaaS)

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text] Wired reported earlier this week that hackers posted a “data dump, 9.7 gigabytes in ...
Read More

White House cybersecurity czar: Threat awareness has improved, but protection hasn’t

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text] Federal agencies are increasingly engaged in cybersecurity issues and understand they have something to ...
Read More

Facebook’s Cybersecurity Platform Hits Critical Mass

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text]More than 90 companies are now using Facebook’s cybersecurity platform, ThreatExchange, to share security and ...
Read More

China Cracks Down On Cybercrime With 15K Arrests

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text]The country is taking a serious stance in the fight against cybercrime as it continues ...
Read More

Innovative propsoals sought by DARPA to thwart DDoS attacks against networks

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text]The Pentagon's research arm wants better, more innovative defenses against distributed-denial-of-service attacks on networks that ...
Read More

The Risks Associated With the BYOD Phenomenon

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text] In a Bring Your Own Device (BYOD) system, generally, employees utilize Wi-Fi is to ...
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top