Industry News Blogs - Page 56 of 58 - Attivo Networks

Cybersecurity Lessons From NBA MVPs LeBron James and Stephen Curry

Reading Time: < 1
One of my favorite Chief Information Officers (CIO) that I have the privilege to collaborate with is Dr. Alissa Johnson (known in the Industry as Dr J. - Twitter: @dralissajay), former Deputy CIO of the White House and now Chief Information Security Officer (CISO) at ...
Read More

Senate Rejects Measure to Strengthen Cybersecurity

Reading Time: < 1
On the heels of a vast breach of the personal information of federal employees, the Senate failed Thursday to advance a cybersecurity measure, the third time in three years that a bipartisan effort to tackle the problem has fallen victim to procedural actions. Read more.
Read More

How do the security experts keep themselves safe online?

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text]There are a million and one things you should do to keep yourself safe online, ...
Read More

Hackers May Have Obtained Names of Chinese With Ties to U.S. Government

Reading Time: < 1
Investigators say that the Chinese hackers who attacked the databases of the Office of Personnel Management may have obtained the names of Chinese relatives, friends and frequent associates of American diplomats and other government officials, information that Beijing could use for blackmail or retaliation. Read ...
Read More

None of us are safe: Major cybersecurity company hacked

Reading Time: < 1
Kaspersky Lab detected a sophisticated and expensive hack it says was carried out by a country. Guess what: Even the best security companies can be hacked. That's what Moscow-based Kaspersky Lab said Wednesday when it announced its systems had been attacked, most likely by hackers ...
Read More

Exclusive: U.S. tech industry appeals to Obama to keep hands off encryption

Reading Time: < 1
As Washington weighs new cybersecurity steps amid a public backlash over mass surveillance, U.S. tech companies warned President Barack Obama not to weaken increasingly sophisticated encryption systems designed to protect consumers' privacy. Read more.
Read More

Cyber-thieves cash in from malware

Reading Time: < 1
Cyber-thieves can reap returns of almost 1,500% when they invest in ransomware, a study suggests. Trustwave looked at how much cash typical cybercriminals spend and what their potential profits might be. It estimated it would cost $5,900 (£3,860) to buy a ransomware kit that could ...
Read More

Majority of Security Breaches Discovered by a Third-Party

Reading Time: < 1
A recent survey of 1,000 IT professionals reveals that the majority of security breaches (70%) are first discovered by third-party entities rather than the impacted organization itself. The study also found that 46% of organizations which were the subject of a serious data breach took ...
Read More

Even cyber-security professionals can struggle to understand security

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text]Scratch the surface and dangerous pockets of ignorance and misunderstanding are not hard to find. ...
Read More

Breach detection: Five fatal flaws and how to avoid them

Reading Time: < 1
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text]IT Security today is not about defending a (non-existent) perimeter, but about protecting the organization’s ...
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top