security Blog Terms - Page 3 of 3 - Attivo Networks

security

Use Cases: Securing Applications and Data

We asked 25 security professionals to provide us with some examples of use cases where they are helping clients secure applications and data. Here’s what they told us:

Securing Apps/Devices/APIs/IoT

1) We ensure apps that manage valuable data (personally identifiable information, healthcare data) are secure. We see data dumps of SQL databases from insecure apps on the dark web all the time. We help customers identify their high-risk applications, identify the kind of data at stake, and evaluate the risk to the company. We prioritize and put the appropriate testing in place to protect customer data managed by the web app. 2) Hackers are using apps to break into internal networks of corporations. Any app poses a risk if someone can access your mainframe through it. We help clients identify the risk of their apps.

Hackers Ran Through Holes in Swift’s Network

The Society for Worldwide Interbank Financial Telecommunication has James Bond-level security at the facilities it uses to move millions of bank-payment orders around the world every day.

Visitors to a Swift operations center in Culpeper, Va., say their car trunks were inspected upon arrival by armed guards, who used mirrors to check under the chassis. Security inside included a fingerprint scan, a test for chemical weapons and an iris scanner in the most restricted areas.

“It’s like Fort Knox,” says Mohan Murali, chief executive of Axletree Solutions Inc., which helps banks and companies connect to Swift.

Attivo Networks Named a Finalist for the 2017 Tech Trailblazers Award

Fremont, CA, – Attivo Networks® announced today that Tech Trailblazers, the first independent and dedicated awards program for enterprise information technology startups, has recognized its ThreatMatrix™ technology on an elite list of finalists for the fifth edition of the Tech Trailblazers Awards in the Security category. Focused on enterprise technology, the global Tech Trailblazers program recognizes and rewards technological and commercial innovation and entrepreneurial excellence.

7 Tips For Getting Your Security Budget Approved

‘Tis the season for building budgets, and security managers are under pressure to get the funds they need to protect their organizations. Of course this is easier said than done.

The road to budget approval is paved with difficult conversations between infosec professionals and business executives. If security leaders don’t convey their needs in an understandable way, they risk disapproval from decision-makers and, as a result, less security spend.

Major security predictions for 2016

If a week is a long time in politics, as former British Prime Minister Harold Wilson observed, a year in cybersecurity can seem like an eternity. But despite the rapid changes, many things remain constant. Check Point’s top three predicted security threats for 2015 were the rapid growth in unknown malware, in mobile threats, and in critical vulnerabilities in commonly used platforms (Android, iOS and others). These were fully realised, and are likely to remain a significant threat. The cat-and-mouse game that has typified cybersecurity in recent years continues, with hackers constantly finding new ways in which to attack networks – as this year’s high-profile breaches at Anthem, Experian, Carphone Warehouse, Ashley Madison and TalkTalk showed.

How Hackers Took Down a Power Grid

It was an unseasonably warm afternoon in Ukraine on Dec. 23 when the power suddenly went out for thousands of people in the capital, Kiev, and western parts of the country. While technicians struggled for several hours to turn the lights back on, frustrated customers got nothing but busy signals at their utilities’ call centers.

Top security stories of 2015

As many as 11 million customers may have been affected by a data breach at U.S. health insurance provider Premera Blue Cross, in the second large attack against the health care industry disclosed in the last two months.

The breach, discovered on Jan. 29, may have compromised customer names, birth dates, Social Security numbers, mailing and email addresses, phone numbers and bank account details, as well as claims and clinical information, Premera said on its website.

Limits of Amazon Web Services Security Controls and the Need for Deception Technology

Amazon Web Services (AWS) offers a range of robust security controls but relying solely on AWS to ensure information security is a mistake. Amazon makes clear that public clouds entail a shared security model. Amazon will manage physical security, implement network security, lock down hypervisors, and provide tools, such as identity management services and virtual private clouds, for customers to use as needed. Customers, in turn, are responsible for implementing access control policies, monitoring systems, and assessing applications for vulnerabilities.

Scroll to Top