While there is no silver bullet in cybersecurity, concealing your organisation’s most high-value targets could the intruder from escalating their attacks, says Ray Kafity, vice president for Middle East Turkey and Africa (META), Attivo Networks. Read the complete article by Ray Kafity in ITP.net.
The Endpoint Detection Net solution elevates security control by accurately raising alerts and taking proactive measures to derail attackers. These capabilities include early attack detection based on: • Unauthorized Active Directory queries from an endpoint. Attackers seeking information on privileged domain accounts, systems, and other high-value objects will now receive fake Active Directory results, which …
The Attivo Endpoint Detection Net product is tackling endpoint security challenges head-on by making every endpoint a decoy designed to disrupt an attacker’s ability to break out and further infiltrate the network. It does this without requiring agents on the endpoint or causing disruption to regular network operations. The company used historical attack data and …
Ray Kafity, VP at Attivo Networks META region, said it is generally understood that prevention alone is not enough, and attackers now have the ability to ‘roam’ or sit inside a network for extended periods of time before proceeding with an attack/data breach. There is a need to have a tool to control the network once it is compromised. Businesses are now looking to deploy so-called ‘honey pots’ inside the network to trap the attacker by creating a fake environment based on a deception solution. However, this solution must be based on authentic operating systems and must reflect a similar DNA to the true network.
No industry is immune to hacking. In this digital age, no organisation can be considered as entirely safe from cybercriminals. As organisations invest in transformational technologies to streamline operations, maximise efficiencies and increase open communications, they are also introducing new gateways for criminals to enter their systems. According to IDC Health Insights 2017, it is predicted that by 2021, the first US$1 million class-action lawsuit against a medical device manufacturer will be filed for negligence due to a cyberattack that led to the death of at least 25 patients connected to a network while in the hospital and the latest example of healthcare facilities falling victim to cyberattacks was the ‘WannaCry’ attack on the National Healthcare System in the UK.
“In addition to early detection, sports organisations that invest in tools for threat and adversary intelligence will be able to better understand their security vulnerabilities, quickly isolate attacks, and prevent recurring attacks. Many organisations are turning to deception technology for offence-driven security designed to significantly reduce dwell time and acceleration remediation by tricking attackers into making a mistake and revealing their presence in the network.”
By: Ray Kafity Things are heating up in the Middle East when it comes to cyberattacks, with entire industries, including regional governments, feeling the brunt. So much so, that mainstay industries like Banking & Finance, Oil & Gas, and Retail are increasingly finding themselves in the crosshairs of cybercrime, making them the most heavily targeted sectors in the region. It has become evident that no organization, regardless of size, is off-limits. Organizations must assume they are a target – or will become one eventually. Therefore, adopting advanced tactics of defense and keeping up-to-date with technological advancements in the field is a necessity.