cloud Blog Terms - Page 2 of 5 - Attivo Networks

cloud

FS-ISAC Europe Summit

The world is focused on the next phase of the pandemic, calling it “the new normal.” We think it’s going to be everything but normal. Current risk frameworks may not be built to support the radical changes financial institutions are confronting. For example, remote work was the exception, but it has quickly become the norm. …

FS-ISAC Europe Summit Read More »

FS-ISAC 2020 Fall Summit

The world is focused on the next phase of the pandemic, calling it “the new normal.” We think it’s going to be everything but normal. Current risk frameworks may not be built to support the radical changes financial institutions are confronting. For example, remote work was the exception, but it has quickly become the norm. …

FS-ISAC 2020 Fall Summit Read More »

SaaS

Attivo Solutions for SaaS Cybersecurity

Written by: Zakk K, Security Architect at Attivo Networks – As the enterprise becomes more dependent on software delivered via an externally-hosted service that someone else maintains, it adds complexity to the security of what used to be a traditionally in-house application for the convenience and affordability of being able to consume software as a service. An example of this is when on-premise email servers are replaced with cloud-based Microsoft 365 (formerly known as Office 365) services, raising questions about the effectiveness of using traditional security controls hosted at the datacenter for protecting an externally hosted service.

illustrates cybersecurity reports

Recent Reports Shed Light on Today’s Cybersecurity Priorities

Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks – For those in the cybersecurity industry, the Verizon Data Breach Investigations Report (DBIR) is one of the most anticipated publications of the year. The report always includes interesting data and research, helping to shed light on some of the most important issues facing the cybersecurity industry today. The 2020 DBIR is no exception, but it is also not the only interesting report published within the past several months. FireEye Mandiant has also released its M-Trends 2020 report and its 2020 Security Effectiveness report, and—taken together rather than individually—these new reports provide real insight into the state of the industry. Below, you can find our top 10 takeaways.

AD security for Google Cloud

Attivo Networks has expanded ADSecure to the Google Cloud Managed Service for Microsoft Active Directory (AD). The solution detects and reduces risks from cyber attacks at companies that run Active Directory with Google’s managed service. … The combination of ADSecure and Google Cloud’s Managed Service for Active Directory is intended to prevent attackers from gaining …

AD security for Google Cloud Read More »

Attackers dwelling in compromised networks for months

Security teams are still struggling to cut down the time attackers spend infiltrating enterprise networks, with hackers routinely dwelling inside compromised networks for 100 days or more. … A survey conducted by Attivo Networks found that 64% of respondents felt that 100 days of dwell time — the timespan between an attacker entering a network …

Attackers dwelling in compromised networks for months Read More »

Businesses struggle to reduce hacker dwell time

Many firms don’t even track dwell time metrics. … One of the main challenges facing cybersecurity professionals is reducing hacker dwell time, according to a new report from Attivo Networks. Dwell time is described as the incubation period between the moment hackers compromise a network and when an attack is conducted – be it ransomware, …

Businesses struggle to reduce hacker dwell time Read More »

Top threat detection trends and challenges for cybersecurity professionals

User networks and endpoints are the biggest concerns for 65% of respondents, an 11% increase from last year, Attivo Networks reveals. … The report attributes this shift to four primary factors: the evolution of an increasingly perimeter-less environment; the sheer number of successful endpoint attacks; the rising cost per endpoint breach; and difficulties associated with …

Top threat detection trends and challenges for cybersecurity professionals Read More »

Research from 1,200 Cybersecurity Professionals Shows Securing Endpoints as Top Concern and Challenges in Reducing Attack Dwell Times

Respondents rank detection controls and cite cyber deception as the top attack disrupter among a range of traditional solutions … Attivo Networks®, an award-winning leader in deception for cybersecurity threat detection, today announced the availability of a new research report, titled “Top Threat Detection Trends.” The research highlights the top threat management challenges of cybersecurity …

Research from 1,200 Cybersecurity Professionals Shows Securing Endpoints as Top Concern and Challenges in Reducing Attack Dwell Times Read More »

Ward off IoT attackers with deception

Attivo Networks has integrated its ThreatDefend platform based on deception technology into the Azure Security Center. … This should improve the detection rate and response time when attacking the Azure IoT Edge. Since IoT technology on the network edge (Intelligent Edge) is a common target for attackers, the service is intended to mitigate risks by …

Ward off IoT attackers with deception Read More »

Scroll to Top