Ray Kafity

intelligent CISO

Cybersecurity predictions: Identity protection to be a priority in 2022

The 2021 Verizon Data Breach report highlighted that 61% of breaches involved credential data. “If there is one thing we can learn from 2021, is that the cyberattackers focus on credentials to expand their reach into their victim’s networks. “Take, for example, the Colonial Pipeline incident where fuel shortages resulted from a single compromised password or the …

Cybersecurity predictions: Identity protection to be a priority in 2022 Read More »

Attivo Networks enhances its ThreatDefend Detection Platform

The Endpoint Detection Net solution elevates security control by accurately raising alerts and taking proactive measures to derail attackers. These capabilities include early attack detection based on: • Unauthorized Active Directory queries from an endpoint. Attackers seeking information on privileged domain accounts, systems, and other high-value objects will now receive fake Active Directory results, which …

Attivo Networks enhances its ThreatDefend Detection Platform Read More »

Attivo Networks use Deception to Ambush Cyber Attackers at Endpoint

The Attivo Endpoint Detection Net product is tackling endpoint security challenges head-on by making every endpoint a decoy designed to disrupt an attacker’s ability to break out and further infiltrate the network. It does this without requiring agents on the endpoint or causing disruption to regular network operations. The company used historical attack data and …

Attivo Networks use Deception to Ambush Cyber Attackers at Endpoint Read More »

IT Web logo

Visibility, intelligence at the heart of next-generation security

Ray Kafity, VP at Attivo Networks META region, said it is generally understood that prevention alone is not enough, and attackers now have the ability to ‘roam’ or sit inside a network for extended periods of time before proceeding with an attack/data breach. There is a need to have a tool to control the network once it is compromised. Businesses are now looking to deploy so-called ‘honey pots’ inside the network to trap the attacker by creating a fake environment based on a deception solution. However, this solution must be based on authentic operating systems and must reflect a similar DNA to the true network.

Intelligent CIO

Attivo Networks expert on protecting systems and patients in healthcare

No industry is immune to hacking. In this digital age, no organisation can be considered as entirely safe from cybercriminals. As organisations invest in transformational technologies to streamline operations, maximise efficiencies and increase open communications, they are also introducing new gateways for criminals to enter their systems. According to IDC Health Insights 2017, it is predicted that by 2021, the first US$1 million class-action lawsuit against a medical device manufacturer will be filed for negligence due to a cyberattack that led to the death of at least 25 patients connected to a network while in the hospital and the latest example of healthcare facilities falling victim to cyberattacks was the ‘WannaCry’ attack on the National Healthcare System in the UK.

tahawul tech logo

A whole new ballgame: how to tackle cyber threats in the sports industry

“In addition to early detection, sports organisations that invest in tools for threat and adversary intelligence will be able to better understand their security vulnerabilities, quickly isolate attacks, and prevent recurring attacks. Many organisations are turning to deception technology for offence-driven security designed to significantly reduce dwell time and acceleration remediation by tricking attackers into making a mistake and revealing their presence in the network.”

Scroll to Top