breach detection Blog Terms - Attivo Networks

breach detection

3 Tricks to Safeguard Your Credentials and Prevent a Data Breach

Cybercriminals are growing more advanced. Many are well-funded, their tactics are increasingly cunning, and more and more of them use modern tools like AI to aid their efforts. So it might surprise many people to learn that one of the most successful tactics employed by cybercriminals remains credential theft. Too many organizations are leaving credentials …

3 Tricks to Safeguard Your Credentials and Prevent a Data Breach Read More »

Is cyber deception the latest SOC ‘game changer’?

Cyber deception reduces data breach costs by more than 51% and Security Operations Centre (SOC) inefficiencies by 32%, according to a new research report by Attivo Networks and Kevin Fiscus of Deceptive Defense. The paper identifies the direct and measurable financial and productivity benefits of deception technology for organisations of all types and sizes. According …

Is cyber deception the latest SOC ‘game changer’? Read More »

Webinar: A New Way to Minimize Active Directory Security Risk

Connect with Chris Roberts, Chief Security Strategist of Attivo Networks and host Sarah Ashburn of Attivo Networks to hear about the company’s new ADSecure solution, which is designed to improve security to Active Directory (AD) and reduce risk. All, without interfering with the AD production environment. Reducing Active Directories Attack Footprint… • Let’s be frank…Active …

Webinar: A New Way to Minimize Active Directory Security Risk Read More »

Security controls must keep pace with internet-connected devices

Interconnected devices are becoming the standard across all facets of technology. We are seeing this in everything from smart cities to tea pots and toasters. New IoT devices are popping up daily, rapidly adding to the 23 billion that already exist. These devices are designed for availability, accuracy and efficient work. Unfortunately, unprecedented numbers of these devices are hitting the market with poor security access control and little to no management oversight, making them a prime target for cyberattack. The goal of an attack is to control the device, but more common and concerning are the new ways an attacker can use devices to gain access to corporate, medical or operational networks. As a result, organizations must change the way they approach their security controls. It is no longer feasible to assume a security team can find every endpoint device, much less secure them.

BankNews_logo2

Decoys to Dye Packs: Facing Down Cybersecurity Threats

The days of Jesse James’s train and bank robberies and John Dillinger kicking down doors with his trademark Tommy gun may be long gone, but bank heists are alive and well in the 21st century — albeit with a new flair. Instead of dramatic physical robberies, today’s criminals have shifted the battleground to cybersecurity, infiltrating the networks of financial institutions globally to steal money and personal information. The attacks remain staggering. Back in 2012, individuals and businesses are believed to have lost approximately $78 million during Operation High Roller. Fast forward to today, and the hacking group known as Bandidos Revolution Team is reported to have stolen hundreds of millions of pesos by infiltrating interbank payment systems and hacking into ATMs. Notably, this group is not believed to be connected to another, separate 300-million-peso heist from five banks last year.

How to find an MSP to protect you from outsourcing IT risks

“IT often can’t do it all. MSPs and MSSPs (managed security service providers) certainly have their place in helping offload work, adding skills and redundancy. We do, however, need to slow down and think before we just hand over the keys to our kingdoms,” according to Chris Roberts, chief security strategist of Attivo Networks, a leading expert on counter threat intelligence.

computer weekly

GDPR: Are we there yet?

They have trouble modifying their strategy to report within 72 hours. Previous directives from the EU made no specific mention of data breaches, and GDPR now sets a clear directive as to what constitutes a data breach, how the incident is to be reported and the substantial penalties for not complying,” she said. “This has required businesses to reassess their technology and processes to understand their ability to detect, audit and report breaches in compliance with GDPR. Closing these gaps, in many cases, requires the adoption of new technology to ensure that the attack is not only detected, but understood in a way that can explain the magnitude of the breach and the corrective actions to contain it.

Joseph Salazar, Attivo Networks® Engineer and InfoSec Veteran, Speaks at H-ISAC on the Impact of Deception Technology

Attivo Networks, the award-winning leader in deception for cybersecurity threat detection, today announced that Joseph Salazar, Technical Marketing Engineer, will present at this year’s H-ISAC (Health – Information Sharing and Analysis Center) Spring Summit. During his session, “Gaining an Operational Advantage with Full Fabric Deception Technology,” Salazar will take a deep dive on deception technology, discussing how it can be used to mitigate cybersecurity risk across the healthcare industry.

CISO Mag logo

Continuous innovation is the key to cyber safety

Many drivers and passengers died because safety simply wasn’t a motivating factor in the design and creation of the automobile. Since then, a parade of features has been added to increase car safety. These initially included brakes and lap belts, then seatbelts, directional blinkers, headlights, taillights, brake lights, fog lights, and eventually advanced innovations like anti-lock brakes, traction control, airbags, lane keeper assists, auto braking, lidar, backup cameras, and front facing cameras.

Scroll to Top