threat detection Blog Terms - Attivo Networks

threat detection

Attivo Networks® Announces Continuous Assessment and Enforcement of Privileged Access

FREMONT, Calif. – March 3, 2021 – Attivo Networks®, the industry experts in lateral movement attack detection and privilege escalation prevention, today announced the expansion of its Active Directory protection suite of products with a new and innovative way to discover and remediate exposures in Active Directory (AD) that could lead to breaches.

Hunting Threats with FireEye and Attivo Networks Webinar

Join this webinar with Chris Unick of FireEye and Joseph Salazar of Attivo Networks to reduce the time and resources required to detect threats, analyze attacks, and remediate infected endpoints, ultimately decreasing your organization’s risk of breaches and data loss. Attivo Networks® has partnered with FireEye to provide advanced, real-time, in-network threat detection and improve …

Hunting Threats with FireEye and Attivo Networks Webinar Read More »

SC Magazine

Deception, an honest way to reveal insider threats

To prove beyond a doubt that an insider is acting in an unauthorised way organisations can collect irrefutable proof of a perpetrator’s actions, deceiving insiders by planting fake assets or information. Malicious insiders represent one of the greatest cyber threats an organisation can face. An insider armed with first-hand experience of the company’s most valuable …

Deception, an honest way to reveal insider threats Read More »

CISO Mag logo

Are You Remotely Secure?

COVID-19 pandemic has pushed the concept of remote working beyond any preconceived growth expectations. It doesn’t appear a short-term situation as many organizations and their employees benefit from this new business structure. Rightfully so, IT and security teams should be “virtual” fist-bumping to celebrate rapidly transitioning operations and, in most cases, avoiding any extensive downtime …

Are You Remotely Secure? Read More »

Research from MIT Sloan Indicates Top CISO Priority is Enhancing Coverage for a Wide Variety of Attack Types and Surfaces

Security Executives are Concerned about Combatting Ransomware and Improving Cloud Security … Attivo Networks®, an award-winning leader in deception for cybersecurity threat detection, today announced its participation with SINC and MIT Sloan on a research report entitled “The Cybersecurity Landscape: Challenges and How to Overcome Them.” The research differs from the Attivo Networks Top Threat …

Research from MIT Sloan Indicates Top CISO Priority is Enhancing Coverage for a Wide Variety of Attack Types and Surfaces Read More »

Protection of VPN concentrators through deception

Given the rapidly increasing number of employees who work from home, VPN (virtual private network) infrastructures are particularly at risk. … The focus is on so-called VPN concentrators. A VPN concentrator is in the ‘middle’ of the network, i.e. at the hub; it concentrates VPN connections and forwards traffic. This is usually hardware for cryptographic …

Protection of VPN concentrators through deception Read More »

Help Net Security Logo

Top threat detection trends and challenges for cybersecurity professionals

User networks and endpoints are the biggest concerns for 65% of respondents, an 11% increase from last year, Attivo Networks reveals. … The report attributes this shift to four primary factors: the evolution of an increasingly perimeter-less environment; the sheer number of successful endpoint attacks; the rising cost per endpoint breach; and difficulties associated with …

Top threat detection trends and challenges for cybersecurity professionals Read More »

Research from 1,200 Cybersecurity Professionals Shows Securing Endpoints as Top Concern and Challenges in Reducing Attack Dwell Times

Respondents rank detection controls and cite cyber deception as the top attack disrupter among a range of traditional solutions … Attivo Networks®, an award-winning leader in deception for cybersecurity threat detection, today announced the availability of a new research report, titled “Top Threat Detection Trends.” The research highlights the top threat management challenges of cybersecurity …

Research from 1,200 Cybersecurity Professionals Shows Securing Endpoints as Top Concern and Challenges in Reducing Attack Dwell Times Read More »

CISO Mag logo

Lock Down the Endpoint with Cyber Deception

Every device that connects to a network creates a security risk. There are many forms of defenses designed to protect these endpoints including anti-virus, firewalls, HIPS, endpoint detection and response (EDR), and other forms of access control. Most of these solutions require installed agents to manage authorizations and authentication, track device activities, and detect and remove viruses and malware. Despite the efforts applied to endpoint protection and EDR solutions, it is inherently insufficient. Even if you could find every endpoint, manage every agent, and keep every device consistently patched, there are fundamentally too many attack vectors to keep up with.

SecurityWeek Logo

Classification Concerns Over FISMA Report on Improving Agency Cybersecurity

The Federal Information Security Modernization Act (FISMA) annual report to Congress for full year 2018 indicates considerable success in improving the cybersecurity of federal agencies. The headline statistics indicate a 12% reduction in the occurrence of cybersecurity incidents from 35,277 in FY 2017 to 31,107 in FY 2018. “However,” adds the report (PDF), “FY 2018 marked the first year since the creation of the major incident designation that no incidents met the threshold.” A ‘major incident’ is defined as any incident that is likely to result in demonstrable harm to the national security interests, foreign relations, or the economy of the United States or to the public confidence, civil liberties, or public health and safety of the American people. It also applies, with the same criteria, to any breach involving the theft or alteration of PII belonging to more than 100,000 people.

Scroll to Top