in-network detection Blog Terms - Attivo Networks

in-network detection

2021 Verizon Data Breach Investigations Report Highlights Importance of In-Network Defenses

Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks – The Verizon Data Breach Investigations Report (DBIR) is always hotly anticipated by those in the cybersecurity industry, and the 2021 edition is no exception. While last year’s report analyzed data collected before the COVID-19 pandemic had begun in earnest, the 2021 report provides an in-depth look at how attack patterns evolved amid a tumultuous 2020. To create this year’s DBIR, Verizon analyzed nearly 80,000 recorded incidents from 88 countries, providing readers a data-rich breakdown of the state of cybersecurity amid the pandemic.

How to deal with IoT device proliferation

With the abundance of IoT devices proliferating into just about every aspect of life, it has become much harder to control their unwanted access. … When a new device connects to the network — by design or mistake — it can become complicated for security professionals to monitor these endpoints and devices. It’s no longer …

How to deal with IoT device proliferation Read More »

Security controls must keep pace with internet-connected devices

Interconnected devices are becoming the standard across all facets of technology. We are seeing this in everything from smart cities to tea pots and toasters. New IoT devices are popping up daily, rapidly adding to the 23 billion that already exist. These devices are designed for availability, accuracy and efficient work. Unfortunately, unprecedented numbers of these devices are hitting the market with poor security access control and little to no management oversight, making them a prime target for cyberattack. The goal of an attack is to control the device, but more common and concerning are the new ways an attacker can use devices to gain access to corporate, medical or operational networks. As a result, organizations must change the way they approach their security controls. It is no longer feasible to assume a security team can find every endpoint device, much less secure them.

informationmanagement-logo

Losing the cyber security war, more organizations beefing up detection efforts

The battle to keep cyber attackers from successfully compromising networks is not working, according to a recent report by threat detection company Attivo Networks. The company surveyed more than 450 cyber security professionals worldwide from August to December 2018, and more than half of the respondents reported that 100 days of dwell time or more was representative of their organization, while nearly half indicated that their mean time to detection was plateauing or increasing.

Scroll to Top