information security Blog Terms - Attivo Networks

information security

How to avoid scams online: Protect your data and gadgets when working from home

How do you stay safe when you’re stuck working from home? Trusted Reviews reached out to a range of security experts to determine the top ways to dodge cyber scams and keep your personal data safe. … A key way to avoid falling victim to scams is to remain one step ahead of the scammers. …

How to avoid scams online: Protect your data and gadgets when working from home Read More »

Webinar: Would I Lie to You? How Deception is Shaping Our Future.

Learn how organizations are applying deception and detection techniques to the global fight for information dominance, where they so desperately need an advantage against the adversary. We will look at how a well architected deceptive environment can be used in a tactical manner, to aid awareness, identification, and provide the necessary fidelity around alerts and …

Webinar: Would I Lie to You? How Deception is Shaping Our Future. Read More »

Not Another GDPR Comment

Many organisations have been able to address Articles 32 and 25 of GDPR, but many still struggle with Article 33. Numerous organisations have difficulty identifying if an incident happened and if it happened, they have trouble modifying their strategy to report within 72 hours. Previous directives from the EU 95/46 made no specific mention of data breaches and GDPR now sets a clear directive as to what constitutes a data breach, how the incident is to be reported and the substantial penalties for not complying. This has required businesses to reassess their technology and processes in order to understand their ability to detect, audit, and report breaches in compliance with GDPR. Closing these gaps, in many cases, requires the adoption of new technology to ensure that the attack is not only detected but also understood in a way that can explain the magnitude of the breach and the corrective actions to contain it. Whether it be access to budget, skills shortages, or otherwise, a fair amount of organisations remain hard-pressed to comply with this article if faced with a breach today.

Hefty Penalty for Smallish Breach in Vermont

Attorney General Says Cloud Services Firm Failed to Notify Customer of Breach

The online exposure of an unsecured spreadsheet containing personal data on 660 subscribers to the Affordable Care Act health insurance exchange in Vermont has led the state to impose a $264,000 penalty on an IT services firm.

Under the terms of a settlement with the state’s attorney general, Samanage USA Ltd. agreed to improve its information security and compliance program. The North Carolina-based company is a provider of cloud-based IT support service.

Attivo Networks Receives 2017 Best of Fremont Award

Attivo Networks has been selected for the 2017 Best of Fremont Award in the Information Security category by the Fremont Award Program.

Each year, the Fremont Award Program identifies companies that we believe have achieved exceptional marketing success in their local community and business category. These are local companies that enhance the positive image of small business through service to their customers and our community. These exceptional companies help make the Fremont area a great place to live, work and play.

Gartner Identifies Deception as a Top Technology for Security in 2017

Gartner, Inc. today highlighted the top technologies for information security and their implications for security organizations in 2017. Analysts presented their findings during the Gartner Security & Risk Management Summit, being held here through Thursday.

“In 2017, the threat level to enterprise IT continues to be at very high levels, with daily accounts in the media of large breaches and attacks. As attackers improve their capabilities, enterprises must also improve their ability to protect access and protect from attacks,” said Neil MacDonald, vice president, distinguished analyst and Gartner Fellow Emeritus. “Security and risk leaders must evaluate and engage with the latest technologies to protect against advanced attacks, better enable digital business transformation and embrace new computing styles such as cloud, mobile and DevOps.”

Scroll to Top