critical infrastructure Blog Terms - Attivo Networks

critical infrastructure

Pacific Northwest National Lab

Enhancing OT Deception with Model Driven, High Fidelity Decoys

This webinar will present the capabilities developed by the Pacific Northwest National Laboratory and Attivo Networks collaboration under the Department of Energy Technology Commercialization Fund program to create enhanced deceptions for defense of critical infrastructure OT systems. Register now.

Our Readers Favorite Blogs of 2019

Written by: Mackenzie Blaisdell, Senior Manager of Online Programs – Whether you are still soaking up the last few moments of the holiday season with family and friends or you’re back in the office kicking it into full gear, let’s take a quick moment to reminisce on our cybersecurity readers’ favorite blogs of 2019.

At Black Hat Conference, good guy hackers have a bleak view of US cybersecurity

In a dark conference room lit up by large electronic screens scattered across the walls, dozens of engineers are huddled over computers, trying to safeguard their network from hackers. The room is the Black Hat Network Operations Center at the Mandalay Bay Hotel in Las Vegas, where 15,000 cybersecurity professionals from companies like FireEye and RSA are gathered for the Black Hat Conference. The room is not for show; for most of the attendees, the threat of getting hacked is real.

“In security, there’s a general belief we all have – it’s not whether or not you will be breached or attacked, it’s a matter of when,” says Haiyan Song, senior vice president and general manager at Splunk, a cybersecurity company.

Scroll to Top