threat detection Archives - Attivo Networks

threat detection

Fixing the weaknesses of identity-first security

By Carolyn Crandall, Chief Security Advocate, Attivo Networks. Identity-first security is certainly a buzzword of 2021. Despite having been around for some years before, the concept is now top of mind for companies after Gartner named it as one of its Top Security and Risk Management Trends for 2021 in March. The mass transition to remote working in 2020 …

Fixing the weaknesses of identity-first security Read More »

American Security Today

Attivo Networks Honors Partners Driving Cybersecurity Innovation

Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, is pleased to announce that it has received four 2020 ‘ASTORS’ Homeland Security Awards from American Security Today. The company received a coveted 2020 Platinum ‘Extraordinary Leadership and Innovation Award’ for continued innovation in the field of advancing deception technology and advanced network …

Attivo Networks Honors Partners Driving Cybersecurity Innovation Read More »

SC Magazine

Deception, an honest way to reveal insider threats

To prove beyond a doubt that an insider is acting in an unauthorised way organisations can collect irrefutable proof of a perpetrator’s actions, deceiving insiders by planting fake assets or information. Malicious insiders represent one of the greatest cyber threats an organisation can face. An insider armed with first-hand experience of the company’s most valuable …

Deception, an honest way to reveal insider threats Read More »

CISO Mag logo

Are You Remotely Secure?

COVID-19 pandemic has pushed the concept of remote working beyond any preconceived growth expectations. It doesn’t appear a short-term situation as many organizations and their employees benefit from this new business structure. Rightfully so, IT and security teams should be “virtual” fist-bumping to celebrate rapidly transitioning operations and, in most cases, avoiding any extensive downtime …

Are You Remotely Secure? Read More »

Research from MIT Sloan Indicates Top CISO Priority is Enhancing Coverage for a Wide Variety of Attack Types and Surfaces

Security Executives are Concerned about Combatting Ransomware and Improving Cloud Security … Attivo Networks®, an award-winning leader in deception for cybersecurity threat detection, today announced its participation with SINC and MIT Sloan on a research report entitled “The Cybersecurity Landscape: Challenges and How to Overcome Them.” The research differs from the Attivo Networks Top Threat …

Research from MIT Sloan Indicates Top CISO Priority is Enhancing Coverage for a Wide Variety of Attack Types and Surfaces Read More »

Protection of VPN concentrators through deception

Given the rapidly increasing number of employees who work from home, VPN (virtual private network) infrastructures are particularly at risk. … The focus is on so-called VPN concentrators. A VPN concentrator is in the ‘middle’ of the network, i.e. at the hub; it concentrates VPN connections and forwards traffic. This is usually hardware for cryptographic …

Protection of VPN concentrators through deception Read More »

Help Net Security Logo

Top threat detection trends and challenges for cybersecurity professionals

User networks and endpoints are the biggest concerns for 65% of respondents, an 11% increase from last year, Attivo Networks reveals. … The report attributes this shift to four primary factors: the evolution of an increasingly perimeter-less environment; the sheer number of successful endpoint attacks; the rising cost per endpoint breach; and difficulties associated with …

Top threat detection trends and challenges for cybersecurity professionals Read More »

Research from 1,200 Cybersecurity Professionals Shows Securing Endpoints as Top Concern and Challenges in Reducing Attack Dwell Times

Respondents rank detection controls and cite cyber deception as the top attack disrupter among a range of traditional solutions … Attivo Networks®, an award-winning leader in deception for cybersecurity threat detection, today announced the availability of a new research report, titled “Top Threat Detection Trends.” The research highlights the top threat management challenges of cybersecurity …

Research from 1,200 Cybersecurity Professionals Shows Securing Endpoints as Top Concern and Challenges in Reducing Attack Dwell Times Read More »

Scroll to Top