security Blog Terms - Attivo Networks

security

Improving network security by ‘deflecting’ cybercriminals

Keeping corporate IT networks secure from external attack is a constant task for security teams. However, spotting threats that have already breached defences can be an even bigger challenge. … Sophisticated phishing attacks can trick users into downloading infected files or visiting compromised web pages. A simple mistake can mean that, even with the best …

Improving network security by ‘deflecting’ cybercriminals Read More »

Addressing the IT security challenges COVID-19 has created

While the coronavirus pandemic has furloughed millions of Australian workers, IT security professionals have been hard-pressed; managing ongoing challenges and implementing solutions to new ones. … Ongoing uncertainty and recessionary conditions triggered by the coronavirus shutdowns mean Australian businesses face a tough journey back to profitability and growth. Scalable and resilient ICT infrastructure and systems …

Addressing the IT security challenges COVID-19 has created Read More »

The pandemic is changing typical user behaviour at work

While change is to be expected, it poses challenges for those charged with securing environments, writes Jim Cook. … For many law firms, the COVID-19 pandemic has been their first real-world test of a majority remote worker scenario. Many firms already had flexible remote work arrangements, whether an occasional work-from-home day for teams or certain …

The pandemic is changing typical user behaviour at work Read More »

Health-ISAC

Visit Attivo Networks booth #13 H-ISAC is a trusted community of critical infrastructure owners and operators within the Health Care and Public Health sector (HPH). The community is primarily focused on sharing timely, actionable and relevant information with each other including intelligence on threats, incidents and vulnerabilities that can include data such as indicators of …

Health-ISAC Read More »

TechNet Augusta

TechNet Augusta 2019 gives participants the opportunity to examine and explore the intricacies of the cyber domain. With assistance from the U.S. Army Cyber Center of Excellence and industry experts, the conference is designed to open the lines of communication and facilitate networking, education and problem solving. Leaders and operators also discuss procurement challenges the …

TechNet Augusta Read More »

Securing IoT through deception

The momentum of IoT adoption is showing no signs of slowing, and with it comes increasingly material risk for both businesses and households. The quest for innovation has allowed for security to fall behind, and as a result, these devices have infiltrated our lives while creating an environment where attackers can exploit these solutions for anything from ransomware to extensive denial of service attacks, says Carolyn Crandall, chief deception officer at Attivo Networks.

dc_logo

Data Connectors Vancouver

This one-day conferences feature a Keynote Speaker Session plus 8-10 additional educational speaker sessions discussing current cybersecurity threats and solutions. You’ll also have the chance to visit 30-60 cybersecurity exhibits.

How security teams are turning to decoy networks

Some of the greatest survivors in nature are those that fool predators in order to derail their attack. This allows them to realise the threat and make their escape or fight back. Take, for instance, the juvenile Damselfish. When threatened by predators, this marine marvel shrinks its eyes and grows a large spot on its tail to look like an eye. Having such a decoy deceives anything wishing to dine on the Damselfish into attacking the tail rather than the head. The fish can then swim off to safety while at the same time circumventing its demise. Similar forms of cunningness can also be seen with butterfly fish, octopus, chameleons, and tree frogs, which are all adept at using various forms of camouflage as a defense against predators.

DarkReadingLogo

The Rise of ‘Purple Teaming’

The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team. In 1992, the film Sneakers introduced the term “Red Team” into popular culture as actors Robert Redford, Sydney Poitier, Dan Aykroyd, David Strathairn, and River Phoenix portrayed a team of security experts who hire themselves out to organizations to test their security systems by attempting to hack them. This was a revolutionary concept at the time — the term “penetration test” didn’t even exist yet, and the idea of a friendly security team trying to break through a company’s defenses wasn’t exactly commonplace. Today, penetration testing is an important part of any cybersecurity system, and both internal and external Red Teams play a critical role in that process.

ZDNet Logo

Yes, there are security ramifications to serverless computing

With three in five enterprises now going or planning to go serverless, the attack surface widens. At least one in five organizations, 21%, have implemented serverless computing as part of their cloud-based infrastructure. That’s the finding of a recent survey of 108 IT managers conducted by Datamation. Another 39% are planning or considering serverless resources. The question is, will serverless computing soon gain critical mass, used by a majority of enterprises? Along with this, what are the ramifications for security?

Scroll to Top