Industry News Blogs - Page 55 of 58 - Attivo Networks

THREATS ARE ON THE RISE. KNOW YOUR LANDSCAPE.

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text]Last year, 106 unknown malware hit an organization every hour. And, 83 percent of organizations ...
Read More

“Cyber MAD” is a Bad Idea. Really Bad.

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text]I don’t know how many times I have to say this, but nothing screams “legacy ...
Read More

7 things to do when your business is hacked

Reading Time: < 1
Hint: Success of the incident response team will depend heavily on the preparation done before the breach The first thing an IT security executive should do after the corporate network has been breached is fall back on the incident response plan that was put in ...
Read More

Shark Tank’s Robert Herjavec: On How To Tell If You Are Cyber Secure

Reading Time: < 1
Last Monday – the 15th – password storage maker LastPass was hacked, exposing the email addresses and encrypted master passwords of its users. Last Tuesday – the 16th – in Congressional testimony, House Oversight Chairman, Jason Chaffetz, said that federal cybersecurity “stinks” in response to ...
Read More

Hunt for Deep Panda intensifies in trenches of U.S.-China cyberwar

Reading Time: < 1
Security researchers have many names for the hacking group that is one of the suspects for the cyberattack on the U.S. government's Office of Personnel Management: PinkPanther, KungFu Kittens, Group 72 and, most famously, Deep Panda. But to Jared Myers and colleagues at cybersecurity company ...
Read More

FBI investigating whether Cardinals hacked Astros

Reading Time: < 1
The FBI is investigating whether the St. Louis Cardinals hacked into the computer systems belonging to a rival team: the Houston Astros. The hacked Astros databases include team secrets and operational information, according to Major League Baseball. Signs point to espionage. Read more.
Read More

Half of All Websites Tested Failed Security and Privacy Assessment

Reading Time: < 1
Half of the nearly 1000 websites evaluated in the 2015 Online Trust Audit & Honor Roll study conducted by the Online Trust Alliance (OTA) were found to be failing to protect consumer’s personal data and privacy. Read more.
Read More

Data breaches from nowhere – most compromises still being discovered by third parties

Reading Time: < 1
The majority of data breaches are still being detected by sources outside the affected organisations, security firm Trustwave has reported in its annual report on the topic. Most victims took around three months to uncover incidents. Read more.
Read More

Be paranoid: 10 terrifying extreme hacks

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text]Any device with a computer chip can be hacked, but not all hacks are created ...
Read More

Cybersecurity in the American South – How the Southern States are Playing a Key Role in Defending the Grid

Reading Time: < 1
As cybersecurity threats become increasingly more common and complex, businesses and governments globally are responding by trying to improve their defense infrastructure. Last week we looked at the way that Israel has risen to a global cybersecurity leader, and today we’ll discuss why the American ...
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top