Join this webinar with Joseph Salazar of Attivo Networks to learn how our integration with IBM reduces an organization’s time and resources required to detect, identify, and respond to threats while collecting forensics and developing threat intelligence to reduce the risk of a successful attack. Attivo Networks® has integrated with IBM® to provide advanced security …
Joint Threat Detection Solution is Part of Collaborative Partnership to Respond More Effectively to Cyber Threats Today, Attivo Networks®, an award-winning leader in deception for cybersecurity threat detection, announced an integration with IBM Security Resilient, the company’s security orchestration, automation and response (SOAR) platform. This integration enables organizations to respond rapidly to detected threats by …
Written by: Venu Vissamsetty,VP Security Research, Founding Engineer Attivo Networks – Security Researcher Pedro Ribeiro from the Agile Information Security firm revealed that IBM Data Risk Manager contains four critical severity vulnerabilities, which an unauthenticated attacker can exploit over the network. Attackers can chain these vulnerabilities together to compromise an entire system.
“Because the cloud is a shared security model, traditional approaches to security aren’t working reliably,” said Carolyn Crandall, chief deception officer at Attivo Networks. “Limited visibility leads to major gaps in detection where an attacker can hijack cloud resources or steal critical information.”
IBM and the Ponemon Institute are out with a new study: Hidden Costs of Data Breaches Increase Expenses for Businesses – Study for First Time Calculates the Full Cost of “Mega Breaches,” as High as $350 Million. Among key findings:
Average cost of a data breach of 1 million compromised records is nearly $40 million dollars
At 50 million records, estimated total cost of a breach is $350 million dollars
The vast majority of these breaches (10 out of 11) stemmed from malicious and criminal attacks (as opposed to system glitches or human error)
The average time to detect and contain a mega breach was 365 days – almost 100 days longer than a smaller scale breach (266 days)
In response IT security experts commented below.