insider threat Blog Terms - Attivo Networks

insider threat

How do I select a remote workforce protection solution for my business?

Comments from Carolyn Crandall, Chief Deception Officer, Attivo Networks When selecting a remote workforce protection solution, CISOs need to consider three key areas: exposed endpoints, security for Active Directory (AD) and preventing malware from spreading. Exposed endpoints: standard anti-virus software and VPNs are no match for advanced signature-less or file-less attack techniques. EDR tools enhance …

How do I select a remote workforce protection solution for my business? Read More »

SC Magazine

Deception, an honest way to reveal insider threats

To prove beyond a doubt that an insider is acting in an unauthorised way organisations can collect irrefutable proof of a perpetrator’s actions, deceiving insiders by planting fake assets or information. Malicious insiders represent one of the greatest cyber threats an organisation can face. An insider armed with first-hand experience of the company’s most valuable …

Deception, an honest way to reveal insider threats Read More »

Are You in Position to Avoid Being Held Hostage?

The continued addition of operational technology (OT) into connected networks is playing a key role in expanding the threat landscape. And unfortunately, today’s sophisticated hackers see the evolution as an opportunity to deploy new ways to attack manufactures. … To counter Ransomware 2.0, Attivo Networks recently announced new capabilities to its Endpoint Detection Net (EDN) …

Are You in Position to Avoid Being Held Hostage? Read More »

Research from MIT Sloan Indicates Top CISO Priority is Enhancing Coverage for a Wide Variety of Attack Types and Surfaces

Security Executives are Concerned about Combatting Ransomware and Improving Cloud Security … Attivo Networks®, an award-winning leader in deception for cybersecurity threat detection, today announced its participation with SINC and MIT Sloan on a research report entitled “The Cybersecurity Landscape: Challenges and How to Overcome Them.” The research differs from the Attivo Networks Top Threat …

Research from MIT Sloan Indicates Top CISO Priority is Enhancing Coverage for a Wide Variety of Attack Types and Surfaces Read More »

Attivo Networks® Honored with Five 2020 InfoSec Awards from Cyber Defense Magazine

FREMONT, Calif.–(BUSINESS WIRE)–Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today announced that it was honored with five InfoSec Awards from Cyber Defense Magazine during the RSA Conference 2020 in San Francisco. The Attivo Networks ThreatDefend® Detection Platform was recognized as “Best Product in Cloud Security,” “Cutting Edge Endpoint Security,” “Most Innovative Deception-Based Security,” and “Next Gen Insider Threat Detection.” Additionally, the company was named a “Hot Company in Critical Infrastructure Protection.”

insider-threat-photo

Insider Threat – Tackling the Adversary Within

Written by: Mike Parkin – Product Marketing Engineer – I recently caught a webinar presented by ObserveIT that addressed the challenges presented by “insider threats.” They did a good job of defining the term, the threats, and they laid out some broad-stroke suggestions on how to address the problem. Something they didn’t talk about, was how deception technology is a powerful tool for dealing with this difficult problem.

Attivo Networks® Partners with Help AG to Expand Access to Next-Generation Deception Technology across Middle East

Attivo Networks® announced a strategic partnership and technology integration with Help AG, a leading information security services and solutions provider in the Middle East. This partnership will enable both, Attivo Networks and Help AG to provide organizations access to comprehensive and next-generation deception solutions in the Middle East to equip them with the essential ability to proactively mitigate threats and address their most critical security challenges.

DarkReadingLogo

72% of Government Agencies Hit with Security Incidents

The cause of the incidents large fell on human error and employee misuse.

Nearly three out of four government agencies experienced a security issue last year and 100% cite employees as their largest security threat, according to the 2017 IT Risks In Government survey released this week.

Given their concern with employee-related threats, 57% of government agencies say they focus on endpoint security.

The survey also found only 14% of government agencies believe they are well-prepared to defend against IT risks. The areas where survey respondents are willing to invest in include intellectual property protection, 43%; data breaches, 29%; and fraud, 14%.

More than Half of Ex-Employees Still Have Access to Corporate Networks

A new study by OneLogin has revealed that a large proportion of businesses fail to adequately protect their networks from the potential threat posed by ex-employees.

The firm surveyed more than 600 IT decision-makers in the UK and found respondents were aware that over half (58%) of former employees are still able to access corporate networks even after they’ve left a company. This is particularly concerning when you consider that OneLogin also discovered that almost a quarter (24%) of UK companies have suffered data breaches by former members of staff.

Scroll to Top