IoT Blog Terms - Page 2 of 6 - Attivo Networks

IoT

Digital-Defense-Shield-Frontline.CloudSM-4.4-298x300

Attivo Networks Integrates with Digital Defense Frontline.Cloud

Deception technology is a powerful tool to secure environments against advanced attackers and persistent threats, and it becomes even more powerful when it integrates with the rest of an organization’s security stack. The Attivo Networks ThreatDefend platform offers over 30 native integrations and has now been integrated with the Frontline.Cloud platform from Digital Defense.

Joseph Salazar, Attivo Networks® Engineer and InfoSec Veteran, Speaks at H-ISAC on the Impact of Deception Technology

Attivo Networks, the award-winning leader in deception for cybersecurity threat detection, today announced that Joseph Salazar, Technical Marketing Engineer, will present at this year’s H-ISAC (Health – Information Sharing and Analysis Center) Spring Summit. During his session, “Gaining an Operational Advantage with Full Fabric Deception Technology,” Salazar will take a deep dive on deception technology, discussing how it can be used to mitigate cybersecurity risk across the healthcare industry.

Combatting Triton Malware with Advanced Threat Detection

Written by: Mike Parkin, Technical Marketing Engineer – Malware targeting IoT devices is nothing new. There have been some reasonably famous, or infamous, depending on your perspective, IoT targeted malware incidents. An April article on ZDNetby Danny Palmer, on the Triton malware attack in late 2017, highlights the lessons organizations should take away from the incident. He makes some good points, and there are lessons there that apply to securing more than just the IoT space.

CISO Mag logo

“I believe I am here because I did not fear being different”

I didn’t originally start out thinking I was going to become a sales or marketing professional. If you have ever played Monopoly, think of the stigma they put on that profession, and as such it really wasn’t top of mind. That said, while I was going to Santa Clara University, studying both electrical engineering and computer science, I took a job as an assistant to the VP of Marketing. This was my first introduction to a high-tech workplace. I ended up in sales based on a bet that I could outsell any of the sales reps in the office. I think my boss at the time thought it was never going to happen, but upon my achievement, he did honor the bet. My next two positions were exclusively sales and only after that did I become responsible for marketing programs.

IoT World Today

The Difficulty of Gauging Health Care Cybersecurity Risk

In 2016, the cybersecurity division of the U.S. Department of Homeland Security released a warning that a class of medical devices had a whopping 1,418 vulnerabilities. Admittedly, the devices in question were end-of-life versions of BD Pyxis SupplyStation health care inventory management system. But this extreme example points to the type of collision course that can occur when complex software and connectivity drive core medical device functionality. DHS reasoned that an adversary of low skill could successfully attack the aging Pyxis devices. And over the past decade, security researchers have proven dozens of medical devices, from pacemakers to infusion pumps, are at risk of a cyberattack. Austrian cybersecurity researcher Tobias Zillner, for instance, revealed that a St. Jude Medical pacemaker model produced until 2017 could be hacked using a 2000-era cell phone and the device could be incapacitated within three hours by draining the battery via a cyberattack. A firmware update was later made available to harden that device…

digital health age

How deception can combat the cybersecurity threat to medical devices

In an interview with Digital Health Age web content editor Ian Bolland, Crandall explained the issues that are affecting medical devices when it comes to cybersecurity, including being built on operating systems that were designed to be in networks that are not interconnected. While things are getting connected, the devices that are going onto networks were never designed to be secure in such a way, and the ownership of security is a contentious issue.

2019_CRN-Security100_Award

Attivo Networks® Recognized on CRN’s 2019 Security 100 List

FREMONT, Calif. – February 26, 2019 – Attivo Networks® today announced today that CRN®, a brand of The Channel Company, has named Attivo Networks to its annual Security 100 list in the Network Security category. This list recognizes the coolest security vendors in each of five categories: Endpoint Security; Identity Management and Data Protection; Network Security; SIEM, Risk and Threat Intelligence; and Web, Email and Application Security.

Finance Monthly Game Changers Award 2019

Carolyn Crandall has served as the Chief Deception Officer and CMO of Attivo Networks® since 2015 and has over 30 years of experience building emerging technology markets in the security, networking, and storage industries. She has a demonstrated track record of successfully taking companies from preIPO through to multi-billion-dollar sales and has held leadership positions at Cisco, Juniper Networks, Nimble Storage, Riverbed, and Seagate(i365).

health-data-management- logo

How deception technology can boost security for medical devices

Explosive growth in smart medical devices has created a new set of challenges for the healthcare industry. To adapt to these changes, health IT risk management experts are seeking new ways to better balance integrated services and security. While medical devices are regulated in many ways for functionality, with rules or laws put forth by regulatory agencies, these same regulators have fallen short when it comes to prescribing enforceable security standards that sufficiently address today’s interconnected healthcare systems—an issue made particularly complex by the lack of agreement over whether providers or device manufactures should bear the liability burden.

Scroll to Top