identity security Blog Terms - Attivo Networks

identity security

intelligent CISO

Cybersecurity predictions: Identity protection to be a priority in 2022

The 2021 Verizon Data Breach report highlighted that 61% of breaches involved credential data. “If there is one thing we can learn from 2021, is that the cyberattackers focus on credentials to expand their reach into their victim’s networks. “Take, for example, the Colonial Pipeline incident where fuel shortages resulted from a single compromised password or the …

Cybersecurity predictions: Identity protection to be a priority in 2022 Read More »

Top trends that will define the cybersecurity landscape in 2022

By Jeremy Ho, Vice President – APAC, Attivo Networks. Amidst the ongoing pandemic, the use of digital tools, automation and cloud computing have skyrocketed within APAC organisations. In 2022, as we move into the “new normal”, organisations will continue to face new challenges posed by the increasingly complex cybersecurity landscape. Organisations must thus prepare for …

Top trends that will define the cybersecurity landscape in 2022 Read More »

intelligent CISO

Go Phish: Carolyn Crandall, Chief Marketing Officer, Attivo Networks

We ‘go phishing’ with Carolyn Crandall, Chief Marketing Officer at Attivo, who tells us about her career journey and life inside and outside the office. What would you describe as your most memorable achievement in the cybersecurity industry? My most memorable achievement in cybersecurity was being ranked as one of the top 10 women in …

Go Phish: Carolyn Crandall, Chief Marketing Officer, Attivo Networks Read More »

Tactics for tackling cyber threats in 2022

By Jeremy Ho, Vice President – APAC, Attivo Networks. 2021 looks to be the banner year of cybersecurity attacks as organisations continue their remote ways of working. Moving into 2022, organisations will face an ever-evolving, more complex cybersecurity landscape. By understanding what the future holds with relevance to cybersecurity threats, organisations can pave their way …

Tactics for tackling cyber threats in 2022 Read More »

SECURITY PREDICTIONS FOR 2022: PART ONE

As 2021 draws to a close, security experts are trying to guess at what the threat landscape may look like next year. We speak to some experts to take their predictions and invaluable insights into the coming trends we could be seeing in 2022. Connection across hybrid environments To the end user, the architecture being …

SECURITY PREDICTIONS FOR 2022: PART ONE Read More »

Cybersecurity Predictions for the Year Ahead

By Jeremy Ho, Vice President – APAC, Attivo Networks. 2021 looks to be the banner year of cybersecurity attacks as organisations continue their remote ways of working. As the COVID-19 pandemic forced organisations into accelerating their digital transformation efforts, automation and cloud computing adoption have rapidly increased with the uptake of digital tools in workplaces. Moving …

Cybersecurity Predictions for the Year Ahead Read More »

intelligent CISO

Cybersecurity predictions: Identity protection to be a priority in 2022

Every year, IT and cybersecurity firms round up their predictions on their expectations for the immediate future. While predictions have a particular pull factor in the marketing sense of the word, experts from Attivo Networks share their evidence-based forecasts into cyberattacker behaviour and tactics, techniques and procedures (TTPs). The 2021 Verizon Data Breach report highlighted that 61% of breaches …

Cybersecurity predictions: Identity protection to be a priority in 2022 Read More »

The Achilles Heel of Cybersecurity

By Tom Kellermann, Head of Cybersecurity Strategy for VMware – As geopolitical tension manifests in cyberspace, four rogue nation-states launch asymmetrical cyber-attacks; 100% prevention is impossible. In 2021 cyber cartels are hijacking the digital transformation of corporations and escalating intrusions by leveraging destructive attacks. We must modernize our defenses. Ground truth is imperative, and thus detection and response must become holistic. In most intrusions, adversaries hunt for Active Directory (AD) to escalate privileges and masquerade as authorized users. AD is the prime target in 90% of intrusions. Identity has become the new perimeter and, therefore, our Achilles heel. We must increase identity security visibility to achieve intrusion suppression. I joined the advisory board of Attivo Networks because I fundamentally believe in the dire need to automate identity compromise detection and response.

Close Out Cybersecurity Awareness Month by Focusing on the Basics

Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks – Earlier this month, I wrote about the rise in credential-based cyberattacks and the importance of strong identity security. For Attivo Networks, Cybersecurity Awareness Month has been an opportunity to drive home the danger posed by today’s increasingly advanced attackers while also emphasizing the game-changing nature of …

Close Out Cybersecurity Awareness Month by Focusing on the Basics Read More »

Scroll to Top