Industry News Blogs - Page 54 of 58 - Attivo Networks

Cybersecurity bill could ‘sweep away’ internet users’ privacy, agency warns

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text]The Department of Homeland Security (DHS) on Monday said a controversial new surveillance bill could ...
Read More

New tactics for improving critical infrastructure cybersecurity pushed by MIT consortium

Reading Time: < 1
Stuart Madnick wants to look beyond firewalls, encryption and the other usual technologies deployed by organizations in search of computer security. Instead, the director of the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity wants to understand how factors such as organizational structure and employees impact ...
Read More

Washington Post encrypts its news website

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text]The Washington Post has begun encrypting parts of its website to make it harder for ...
Read More

Pen testing tool or exploit? 6 samples of ways hackers get in

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text] How can you tell the difference between an exploit or a pen testing tool? ...
Read More

FBI Alert: $18 Million in Ransomware Losses

Reading Time: < 1
Ongoing CryptoWall Attacks Lead to Major Expenses In the past year, U.S. businesses and consumers have experienced more than $18 million in losses stemming from a single strain of ransomware called CryptoWall, according to the Internet Crime Complaint Center. Read more.
Read More

The most dangerous data breach ever known

Reading Time: < 1
If the federal government can't protect extraordinarily sensitive data on its own employees, should it be collecting data on the rest of us? Read more.
Read More

Why Cyber War Is Dangerous for Democracies

Reading Time: < 1
This month, two years after his massive leak of NSA documents detailing U.S. surveillance programs, Edward Snowden published an op-ed in The New York Times celebrating his accomplishments. The “power of an informed public,” he wrote, had forced the U.S. government to scrap its bulk ...
Read More

Top 4 cyber risks financial organisations must be ready for

Reading Time: < 1
Why the financial sector’s risk management approach has changed significantly in recent years. The financial sector’s risk management approach has changed significantly in recent years. While some of these changes were expected, such as continued constricted regulations, others were less expected, including an increasing realisation ...
Read More

How you can stay ahead of cybersecurity breaches and off the media’s radar

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text] Last year was a banner year for high-profile data security breaches with Sony, Target, ...
Read More

When is a breach detection system better than an IDS or NGFW?

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text]Breach detection systems are gaining steam, but when would they be more appropriate to use ...
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top