cyber security Blog Terms - Attivo Networks

cyber security

CISO Mag logo

Know Thy Enemy

Know Thy Enemy: Why Company-Centric Threat Intelligence is a Critical Element of Cybersecurity Today’s defenders can have reams of information and log data available to them, with databases chronicling known threats and attack patterns. Unfortunately, the information available in these databases is most effective against documented threats or those with extremely well-established baselines. If an …

Know Thy Enemy Read More »

RSA Conference 2020

What is the most powerful tool to prevent cyberattacks? It’s you. Your ideas, your creativity and your knowledge play a huge role in protecting the digital world. That’s why the theme of RSA Conference 2020 is Human Element. RSA Conference 2020 is here to support you in your mission—by bringing you together with thousands of …

RSA Conference 2020 Read More »

Attivo Networks Named 2020 TAG Cyber Distinguished Vendor

FREMONT, Calif – Sept. 24, 2019 – Attivo Networks, the award-winning leader in deception for cybersecurity threat detection, announced today its selection by TAG Cyber as a Distinguished Vendor in this year’s 2020 Security Annual for the fourth consecutive year. Published each September, the report offers expert guidance, analysis, and education on 50 different aspects of the cybersecurity ecosystem, making it one of the most comprehensive and respected informational reports available in the industry.

dc_logo

Data Connectors Sacramento

This one-day conferences feature a Keynote Speaker Session plus 8-10 additional educational speaker sessions discussing current cybersecurity threats and solutions. You’ll also have the chance to visit 30-60 cybersecurity exhibits.

Security controls must keep pace with internet-connected devices

Interconnected devices are becoming the standard across all facets of technology. We are seeing this in everything from smart cities to tea pots and toasters. New IoT devices are popping up daily, rapidly adding to the 23 billion that already exist. These devices are designed for availability, accuracy and efficient work. Unfortunately, unprecedented numbers of these devices are hitting the market with poor security access control and little to no management oversight, making them a prime target for cyberattack. The goal of an attack is to control the device, but more common and concerning are the new ways an attacker can use devices to gain access to corporate, medical or operational networks. As a result, organizations must change the way they approach their security controls. It is no longer feasible to assume a security team can find every endpoint device, much less secure them.

BankNews_logo2

Decoys to Dye Packs: Facing Down Cybersecurity Threats

The days of Jesse James’s train and bank robberies and John Dillinger kicking down doors with his trademark Tommy gun may be long gone, but bank heists are alive and well in the 21st century — albeit with a new flair. Instead of dramatic physical robberies, today’s criminals have shifted the battleground to cybersecurity, infiltrating the networks of financial institutions globally to steal money and personal information. The attacks remain staggering. Back in 2012, individuals and businesses are believed to have lost approximately $78 million during Operation High Roller. Fast forward to today, and the hacking group known as Bandidos Revolution Team is reported to have stolen hundreds of millions of pesos by infiltrating interbank payment systems and hacking into ATMs. Notably, this group is not believed to be connected to another, separate 300-million-peso heist from five banks last year.

Joseph Salazar, Attivo Networks® Engineer and InfoSec Veteran, Speaks at H-ISAC on the Impact of Deception Technology

Attivo Networks, the award-winning leader in deception for cybersecurity threat detection, today announced that Joseph Salazar, Technical Marketing Engineer, will present at this year’s H-ISAC (Health – Information Sharing and Analysis Center) Spring Summit. During his session, “Gaining an Operational Advantage with Full Fabric Deception Technology,” Salazar will take a deep dive on deception technology, discussing how it can be used to mitigate cybersecurity risk across the healthcare industry.

IoT World Today

The Difficulty of Gauging Health Care Cybersecurity Risk

In 2016, the cybersecurity division of the U.S. Department of Homeland Security released a warning that a class of medical devices had a whopping 1,418 vulnerabilities. Admittedly, the devices in question were end-of-life versions of BD Pyxis SupplyStation health care inventory management system. But this extreme example points to the type of collision course that can occur when complex software and connectivity drive core medical device functionality. DHS reasoned that an adversary of low skill could successfully attack the aging Pyxis devices. And over the past decade, security researchers have proven dozens of medical devices, from pacemakers to infusion pumps, are at risk of a cyberattack. Austrian cybersecurity researcher Tobias Zillner, for instance, revealed that a St. Jude Medical pacemaker model produced until 2017 could be hacked using a 2000-era cell phone and the device could be incapacitated within three hours by draining the battery via a cyberattack. A firmware update was later made available to harden that device…

How to use deception to gain the advantage over cyber-attackers

Deception plays an essential role in any game of strategy, providing an opportunity to trick the opponent into exposing their weaknesses and leaving themselves vulnerable. Given its successes, the application of deceptive techniques has been a mainstay of military tactics, sports playbooks, and gambling for millennia. From tricking a unit of horsemen into overextending their charge to diverting a bomber squadron away from genuine targets, well-placed decoys have delivered powerful results in both offence and defence. Decoys, when paired with lures, can be indispensable in fooling an adversary into engaging or in misdirecting and slowing down their efforts.

Scroll to Top