carolyn crandall Blog Terms - Page 3 of 11 - Attivo Networks

carolyn crandall

DarkReadingLogo

Fake Data and Fake Information: A Treasure Trove for Defenders

No one wants to believe that fake data can influence them, but evidence of its impact is all around us. Studies have shown that fake news can influence how we vote, what we buy, who we support, and what we do. This can transpire through dedicated misinformation campaigns, deceptively edited videos, and the use of …

Fake Data and Fake Information: A Treasure Trove for Defenders Read More »

In Both Cybersecurity and Sports, Star Players Need Support

In the sports world, having a one-star player does not necessarily mean your team will be successful. It’s a concept that those in team sports and the cybersecurity industry are very familiar with. When it comes to protecting your network, there is no silver bullet. No single security control will be able to detect and …

In Both Cybersecurity and Sports, Star Players Need Support Read More »

Data Concealment: An Innovative Weapon for Every Defender’s Toolkit

Despite investments in security modernization and layered security controls, cyberattacks are consistently occurring – particularly during the COVID-19 crisis, as businesses operate with highly distributed workforces and security limitations related to remote working. … Attackers continue to successfully infiltrate corporate networks, gaining access to valuable data that they can then steal or subject to ransom …

Data Concealment: An Innovative Weapon for Every Defender’s Toolkit Read More »

American Security Today

Using Advanced Threat Detection to Enhance Security Orchestration, Automation and Response

Cybercrime is always evolving, and as technology becomes more advanced, so too do the tactics employed by cybercriminals around the globe. … Today’s attackers often carry out attacks with the help of artificial intelligence and machine learning technology, which can enhance both their sophistication and speed. Fortunately, cybercriminals are not the only ones utilizing automated …

Using Advanced Threat Detection to Enhance Security Orchestration, Automation and Response Read More »

CDM Logo

Is What’s Lurking in Your Network About to Come Out?

The COVID-19 crisis was an unprecedented opportunity for attackers. Now, many may be ready to strike. … The COVID-19 pandemic has forced countless millions of people to work remotely, and the rush to enable that remote work created opportunities for attackers to infiltrate corporate networks due to new devices, unmanaged endpoints, security gaps, and other …

Is What’s Lurking in Your Network About to Come Out? Read More »

Know Thy Enemy

Know Thy Enemy: Why Company-Centric Threat Intelligence is a Critical Element of Cybersecurity Today’s defenders can have reams of information and log data available to them, with databases chronicling known threats and attack patterns. Unfortunately, the information available in these databases is most effective against documented threats or those with extremely well-established baselines. If an …

Know Thy Enemy Read More »

How councils can use deception to fight cybercrime

Many cybercriminals are opportunists and take the path of least resistance, aiming at targets that will enable them to make a quick profit with the least effort. … Unfortunately, local government authorities are often precisely the kind of target these criminals seek. Threat actors are well aware that local authorities have vast stores of valuable …

How councils can use deception to fight cybercrime Read More »

Are You Remotely Secure?

COVID-19 pandemic has pushed the concept of remote working beyond any preconceived growth expectations. It doesn’t appear a short-term situation as many organizations and their employees benefit from this new business structure. Rightfully so, IT and security teams should be “virtual” fist-bumping to celebrate rapidly transitioning operations and, in most cases, avoiding any extensive downtime …

Are You Remotely Secure? Read More »

Are You in Position to Avoid Being Held Hostage?

The continued addition of operational technology (OT) into connected networks is playing a key role in expanding the threat landscape. And unfortunately, today’s sophisticated hackers see the evolution as an opportunity to deploy new ways to attack manufactures. … To counter Ransomware 2.0, Attivo Networks recently announced new capabilities to its Endpoint Detection Net (EDN) …

Are You in Position to Avoid Being Held Hostage? Read More »

Scroll to Top