Concealment Blog Terms - Attivo Networks

Concealment

3 Tricks to Safeguard Your Credentials and Prevent a Data Breach

Cybercriminals are growing more advanced. Many are well-funded, their tactics are increasingly cunning, and more and more of them use modern tools like AI to aid their efforts. So it might surprise many people to learn that one of the most successful tactics employed by cybercriminals remains credential theft. Too many organizations are leaving credentials …

3 Tricks to Safeguard Your Credentials and Prevent a Data Breach Read More »

security-boulevard-logo

Securing DevOps Using Deception and Denial

As organizations increasingly utilize DevOps for software development and IT operations, DevOps environments have become a priority target for would-be cybercriminals. Throughout the development process, it is critical to continually assess whether attackers have injected malicious code into the environment, and the nature of DevOps development can make this a challenge. DevOps works according to …

Securing DevOps Using Deception and Denial Read More »

Security Magazine

Derailing ransomware 2.0 requires a little trickery

Ransomware attacks are on the rise – and they are getting more and more sophisticated and destructive. That is bad news for executives struggling to maintain a high level of cybersecurity even as their organizations continue to cope with the massive impact of a pandemic. The good news? Technology is available to help companies better …

Derailing ransomware 2.0 requires a little trickery Read More »

DarkReadingLogo

Fake Data and Fake Information: A Treasure Trove for Defenders

No one wants to believe that fake data can influence them, but evidence of its impact is all around us. Studies have shown that fake news can influence how we vote, what we buy, who we support, and what we do. This can transpire through dedicated misinformation campaigns, deceptively edited videos, and the use of …

Fake Data and Fake Information: A Treasure Trove for Defenders Read More »

CISO Mag logo

Data Concealment: An Innovative Weapon for Every Defender’s Toolkit

Despite investments in security modernization and layered security controls, cyberattacks are consistently occurring – particularly during the COVID-19 crisis, as businesses operate with highly distributed workforces and security limitations related to remote working. … Attackers continue to successfully infiltrate corporate networks, gaining access to valuable data that they can then steal or subject to ransom …

Data Concealment: An Innovative Weapon for Every Defender’s Toolkit Read More »

Scroll to Top