dwell time

Intelligent CIO

Attivo Networks expert on protecting systems and patients in healthcare

No industry is immune to hacking. In this digital age, no organisation can be considered as entirely safe from cybercriminals. As organisations invest in transformational technologies to streamline operations, maximise efficiencies and increase open communications, they are also introducing new gateways for criminals to enter their systems. According to IDC Health Insights 2017, it is predicted that by 2021, the first US$1 million class-action lawsuit against a medical device manufacturer will be filed for negligence due to a cyberattack that led to the death of at least 25 patients connected to a network while in the hospital and the latest example of healthcare facilities falling victim to cyberattacks was the ‘WannaCry’ attack on the National Healthcare System in the UK.

Attivo Networks

Attivo Networks® Survey on Top Threat Detection Concerns and Trends Reveals Surprising Findings

Attivo Networks today announced the results of the company’s 2018 Top Threat Detection Concerns and Trends Survey. This survey reveals new insights about top information security concerns related to detecting and stopping attackers, identifying which technologies are impacting attackers, shifts in time to detection, and technologies being used to impact this change. The company surveyed more than 450 cybersecurity professionals and executives globally to gain insights into detection trends, top threat concerns, attack surface concerns, and what’s on their 2019 security wish list.

Deception technology: An approach that is beginning to gain traction

Data stolen in breaches years ago is still surfacing in financial crimes today, proving that getting over past breaches is hard to do. Simply doing more of the same won’t fix our current challenges.Just within the past six months, the secretary of the Department of Homeland Security (DHS) has been replaced, the White House has eliminated the position of cybersecurity coordinator on the National Security Council, the top three cybersecurity officials at the FBI have departed, several large-scale public sector breaches have occurred – including the City of Atlanta – and the primary elections were off to a rocky start as states and counties grappled with insecure systems and voter distrust.

security-boulevard-logo

Deception Technology: Giving Companies Home Field Advantage

Among the major home field advantages that deception technology provides is that it enables the security defender to quickly identify attackers or policy violations, close the detection gap and shrink dwell time by rapidly detecting the growing number of in-network threats that other security controls miss. By simplifying and automating processes, it also reduces the mean time to remediation, another critical benefit.

DARPA Gets Serious About Tackling Dwell Time

Written by: Carolyn Crandall, Chief Deception Officer and CMO – Dark Reading recently reported on a new Defense Advanced Research Projects Agency (DARPA)-funded research project at Georgia Tech aimed at reducing dwell time. The $12.8 million project, known as “Gnomon,” will look to establish new methods for faster threat detection and network cleanup. Funding for this kind of project could not come at a more critical time.

Scroll to Top