Attivo Networks News

Attivo News

Amex

How to Help Protect Your Customers’ Financial Information

Reading Time: < 1 minute  |  Published: January 22, 2019 in Attivo News
0 Comments

The number of data breaches experienced by small and middle-market businesses is steadily growing, and compromised customers' financial information can especially put your company at risk. Fraud protection and data security require not only the right technology but also the right processes. Data-breach incidents can...

intelligent CISO

Using ROSI to evaluate cybersecurity technologies

Reading Time: 2 minutes  |  Published: January 18, 2019 in Attivo News
0 Comments

Being able to demonstrate ROI on security investments to the board is one of the tasks every CISO encounters. And it is not without its challenges. Intelligent CISO spoke to a number of industry experts who offer some best practice advice to CISOs about how...

enterprisers-project

Kubernetes security: 4 tips to manage risks

Reading Time: < 1 minute  |  Published: January 17, 2019 in Attivo News
0 Comments

Chris Roberts, an adviser at Attivo Networks, concurs that role-based access control (RBAC) must be enabled for robust Kubernetes security, and adds that many elements of a strong security posture remain relevant in container environments: Good policies, procedures, and controls at the user, application, and network...

Cyber risk management and return on deception investment

Reading Time: 2 minutes  |  Published: January 17, 2019 in Attivo News
0 Comments

This article is fifth in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides an overview of how deception fits into information risk management strategies and how organizations can answer C-level ROI...

enterprisers-project

Kubernetes security: 4 areas to focus on

Reading Time: 2 minutes  |  Published: January 14, 2019 in Attivo News
0 Comments

Misconfigurations – which in some cases may be a matter of simply not paying attention to configurations – will be a considerable source of risk as more organizations deploy containerized applications to production environments, according to Chris Roberts, an advisor at Attivo Networks. “How many of...

CyberScoop-logo

APT heist of Singapore health data exploited Microsoft Outlook, inquiry finds

Reading Time: 2 minutes  |  Published: January 11, 2019 in Attivo News
0 Comments

An advanced hacking operation that last year stole personal data on 1.5 million health care patients in Singapore, including the prime minister, targeted an unpatched version of Microsoft Outlook, an official inquiry has found. The hackers exploited a known vulnerability in Outlook using “a publicly available hacking...

Deception for proactive defense

Reading Time: 2 minutes  |  Published: January 10, 2019 in Attivo News, Uncategorized
0 Comments

For many years, enterprise cyber security was primarily reactive. That is, a network perimeter was established to prevent attacks, and if a breach occurred, then response activities were initiated. Typical cyber response activities would include perimeter adjustments, vulnerability remediation, and damage containment. The methodology of...