IoT Blog Terms - Page 5 of 6 - Attivo Networks

IoT

Why Deception Technology Will Change The Game In Our Favor Against Cybercrime And Breaches

Then, I heard about Attivo and as one of the four CDM judges on our Infosec Awards from 2017, with them being one of our winners, receiving an overwhelming positive vote from the judges, I wanted to dig into what they are up to a little further and look at them within the purview of the Time-based Security model – could a solution like the Attivo ThreatDefendTM Deception and Response Platform actually deliver a way to slow down the breaches, because, frankly, we’re not yet going fast enough to stop them?

Oklahoma health department alerts 47,000 clients about data breach for the 2nd time

The Oklahoma Department of Human Services is notifying 47,000 clients their records may have been breached — and it’s the second breach notification about the same incident because DHS neglected to alert the U.S. Department of Health and Human Services the first time.

An unauthorized user accessed a state assessment computer at Carl Albert State College in Poteau, Oklahoma, in April 2016. The server contained the names, addresses, dates of birth and Social Security numbers of both current and former DHS Temporary Assistance for Needy Families clients.

The college secured the data and all organizations involved have employed monitoring efforts after the breach to prevent another attack.

McAfee

Attivo Networks® Achieves Integration with McAfee® ePolicy Orchestrator® Platform through McAfee Security Innovation Alliance™

Attivo Networks® today announced Attivo ThreatDefend™ now integrates with the McAfee ePolicy Orchestrator® (McAfee ePO™) platform to provide a comprehensive solution for advanced threat management and response. This technology integration combines the Attivo ThreatDefend Platform with the McAfee ePO console for increased detection of in-network threats and detailed attack forensics and accelerated incident response. Additionally, the company has joined the McAfee Security Innovation Alliance™ (SIA) partner program. Under the SIA program, the companies will work together to integrate ThreatDefend technology with McAfee Advanced Threat Defense, providing customers an adaptive defense solution to combat modern day advanced threats.

Hospitality’s Hidden Threat: POS

Whether restaurant, hotel or resort, the hospitality industry is intensely focused on creating a pleasurable experience for guests. Unfortunately, hospitality has become an increasingly attractive industry for cybersecurity threats, according to the 2016 Trustwave Global Security Report. The report notes that the hospitality industry accounted for 14 percent of all breaches, second only to the retail industry. Among the more prominent breaches in the last two years are those at Hyatt (August 2014 – December 2015), Hilton (July – August 2015) and Hard Rock Café (September 2014 – April 2015).

RSA Key Sessions for 2017

RSA 2017 is in full swing this week and there are a number of sessions that we are classifying as “must see”. We anticipate deception based detection technology to be covered both in formal meetings and information discussions during the conference. However, since our ThreatMatrix platform now addresses so many vertical markets (financial, healthcare, IoT, SCADA, retail and hospitality) as well as new problems around phishing, cloud security, ransomware, unified swift collaboration in cybersecurity incident response, and assistance through our partners that can help with threat hunting and remediation, we’ve included some of those. We’ve found some top talks for you but before you begin

How safe are smart transport systems?

Mobility has become a critical factor instrumental in making a city smarter, sustainable and resilient. Our world has never been more connected than in this day and age. Approximately 11 billion devices are connected to the Internet at present and this number is likely to triple by 2020 and by 2025, 80 billion devices will be connected to the Internet.
Carrying forward this blazing trend, most countries in the Middle East have placed smart city initiatives at the heart of their future development plans in some shape or form. The Middle East and Africa (MEA) will invest more than $6.6 billion in Internet of Things (IoT) hardware, software, services, and connectivity in 2016 – which is expected to increase to $14.3 billion by 2020. And, transportation is one of the vertical industries leading in terms of IoT investments in the region.

Aruba flexes some IoT muscle

Aruba’s new solutions position the company well to help customers make IoT deployments scalable and secure.
The Internet of Things (IoT) is heating up and will be a hot trend in 2017. And Aruba, a Hewlett Packard Enterprise Company, plans to be a part of it.

Smart City Transport Needs Smart Cyber Security Strategies: IoT

Our world has never been more connected than in this day and age. Everything from wearable devices to smart light bulbs in smart homes can be connected to the cloud.

According to Juniper Research, the number of IoT (Internet of Things) connected devices will number 38.5 billion in 2020, up from 13.4 billion in 2015: a rise of over 285%. In Juniper’s report, The Internet of Things: Consumer, Industrial & Public Services 2015-2020, data shows that while IoT smart homes dominate the news, it is the industrial and public services sector – such as retail, public transport, smart buildings and smart grid applications – that will form the majority of the device base. This is why we felt it was important for our Attivo ThreatMatrix Deception Platform to be the first deception-based threat detection platform for the Internet of Things. We achieved that last May.

Arming IoT Networks with Early and Accurate Advanced Cyber Threat Protection

Internet of Things (IoT) devices are revolutionizing the way we share data and carry a huge charter to improve our banking, shopping, transportation, patient, and individual care and safety, to name a just a few. The mission is admirable, but with thousands of devices flooding the market, the lack of standards and multitude of security deficiencies are creating an on-ramp to corporate, government, and private networks that is wide open to cyberattacks.

Our Critical Infrastructure Safety, a Cautionary Tale

Millions of people throughout the greater Los Angeles area have been left without power, running water or communication in the wake of what is certainly one of the worst disasters in recent American history. Millions of people throughout the greater Los Angeles area have been left without power, running water or communication in the wake of what is certainly one of the worst disasters in recent American history. It is not the first major cyberattack of U.S. infrastructure but certainly the worst, and one that has been predicted for years. Nevertheless, incident response teams across LA business and government were caught unprepared. Despite “red alert” attention, there is no word on when systems will be completely restored due to widespread impact to businesses, government agencies, educational institutions, and individual well-being. The city remains paralyzed as the depth of the cyberattack and recovery plans are still too large to be completely understood.

This would be a news story none of us would want to read.

Scroll to Top