cyber security Blog Terms - Page 3 of 5 - Attivo Networks

cyber security

Why Deception Technology Will Change The Game In Our Favor Against Cybercrime And Breaches

Then, I heard about Attivo and as one of the four CDM judges on our Infosec Awards from 2017, with them being one of our winners, receiving an overwhelming positive vote from the judges, I wanted to dig into what they are up to a little further and look at them within the purview of the Time-based Security model – could a solution like the Attivo ThreatDefendTM Deception and Response Platform actually deliver a way to slow down the breaches, because, frankly, we’re not yet going fast enough to stop them?

DarkReadingLogo

Advanced Deception: How It Works & Why Attackers Hate It

While cyberattacks continue to grow, deception-based technology is providing accurate and scalable detection and response to in-network threats.

Distributed deception platforms have grown well beyond basic DecoyDoc trapping techniques and are designed for high-interaction deceptions, early detection, and analysis of attackers’ lateral movement. Additionally, deception platforms change the asymmetry of an attack by giving security teams the upper hand when a threat enters their network and forcing the attackers to be right 100% of the time or have their presence revealed, and by providing decoys that obfuscate the attack surface and through valuable threat intelligence and counterintelligence that is required to outmaneuver the advanced human attacker.

Oklahoma health department alerts 47,000 clients about data breach for the 2nd time

The Oklahoma Department of Human Services is notifying 47,000 clients their records may have been breached — and it’s the second breach notification about the same incident because DHS neglected to alert the U.S. Department of Health and Human Services the first time.

An unauthorized user accessed a state assessment computer at Carl Albert State College in Poteau, Oklahoma, in April 2016. The server contained the names, addresses, dates of birth and Social Security numbers of both current and former DHS Temporary Assistance for Needy Families clients.

The college secured the data and all organizations involved have employed monitoring efforts after the breach to prevent another attack.

ASTORS Award

Attivo Networks® Honored with Three 2017 ASTORS Homeland Security Awards

Attivo Networks® announced today that it won the 2017 ASTORS Homeland Security Awards in three key categories. American Security Today presented these awards at the ISC East Conference in New York City to recognize organizations that are actively addressing today’s evolving Homeland Security challenges in innovative ways.

EU looks to extra spending, diplomacy to bolster cyber security

BRUSSELS/FRANKFURT (Reuters) – The European Commission wants to bolster cyber security in the EU by increasing investment in technology, setting stricter consumer safeguards and stepping up diplomacy to deter attacks by other nations, among other measures.

The Commission is due to announce its proposals in a report later this month, a copy of which was obtained by Reuters on Wednesday. It also argues for greater national and law enforcement cooperation to halt incoming attacks.

The report calls for a short-term injection of additional EU spending to achieve both a critical mass of investment and overcome fragmentation within the region, calling a previous 2016 plan to spend 1.8 billion euros ($2.1 billion) by 2020 a “first step”.

Malvertising Exposes Millions of Site Visitors at BBC.com, NYTimes and More

Several high-profile media sites, including the New York Times, the BBC, MSN and AOL, are falling victim to a new rash of malicious ads that attempt to surreptitiously inflict malware on unsuspecting site visitors.

According to Malwarebytes, other infected sites in what is almost certainly a coordinated attack include the Comcast outpost My.Xfinity, NFL.com, Realtor, TheWeatherNetwork, Newsweek and thehill.

Scroll to Top