Attivo Networks News

Attivo News

How automation is changing the cyber-security battle

Reading Time: < 1 minute  |  Published: October 26, 2020 in Attivo News
0 Comments

While financial services firms are increasingly embracing artificial intelligence (AI) and machine learning (ML) technologies, they’ve also captured cyber criminals’ attention. Never content to simply maintain the status quo, this group is busy putting the technologies to work to make their techniques stronger and more likely...

Attivo Networks ThreatPath now addresses proliferation of endpoints and credential protection challenges

Reading Time: < 1 minute  |  Published: October 22, 2020 in Attivo News
0 Comments

Attivo Networks announced innovative enhancements to its ThreatPath solution, part of the modular ThreatDefend Endpoint Detection Net (EDN) family of products. ThreatPath, which continuously observes and shows credential exposures, now also provides organizations with the ability to identify and automatically remediate high-risk exposures based on identities...

Attivo ThreatPath helps reduce credential exposures

Reading Time: < 1 minute  |  Published: October 21, 2020 in Attivo News
0 Comments

Attivo Networks has updated its ThreatPath credential exposure tool to identify and remediate high-risk exposures based on identities with excess privileges, application data sources, at-risk practices such as local admin credentials stored on the endpoint, and shadow admin accounts. The idea behind ThreatPath is to help...

security-boulevard-logo

Securing DevOps Using Deception and Denial

Reading Time: < 1 minute  |  Published: October 20, 2020 in Attivo News
0 Comments

As organizations increasingly utilize DevOps for software development and IT operations, DevOps environments have become a priority target for would-be cybercriminals. Throughout the development process, it is critical to continually assess whether attackers have injected malicious code into the environment, and the nature of DevOps...

Why COVID-19 has been good news for cybercriminals

Reading Time: < 1 minute  |  Published: October 12, 2020 in Attivo News
0 Comments

The rush to have staff working remotely has created numerous opportunities for cybercriminals to infiltrate corporate networks. These opportunities are due to people no longer working within a protected infrastructure, using insecure networks, and connecting through client devices that lack vital security patches. It’s tempting for...

security-boulevard-logo

The Dangers of Government-Mandated Encryption Backdoors

Reading Time: < 1 minute  |  Published: October 9, 2020 in Attivo News
0 Comments

In late June, two pieces of legislation were introduced to the U.S. Congress, each offering its own requirements for mandating encryption backdoors—which would effectively put an end to end-to-end encryption. The LAED Act, introduced by three Republican senators, would force tech companies to assist the...

Protecting against Ransomware

Reading Time: < 1 minute  |  Published: October 5, 2020 in Attivo News
0 Comments

Firewalls and classic solutions for endpoint security are insufficient to defend against increasingly sophisticated and targeted attacks against IT infrastructure and applications, warn the security specialists at Attivo Networks. While this combination would offer some protection against common and simple malware attacks , more sophisticated and...

How defence in depth can sink cyber attacks

Reading Time: < 1 minute  |  Published: October 5, 2020 in Attivo News
0 Comments

The cybersecurity of financial institutions is appearing as a top priority for the Bank of England in the coming months. The central bank will focus on stress testing IT defences for online attacks and establishing new standards for how quickly and effectively financial institutions should...

Targeted ransomware – it’s upon us. Are you ready?

Reading Time: < 1 minute  |  Published: October 2, 2020 in Attivo News
0 Comments

Ransomware is evolving. Threat actors are moving away from indiscriminate attacks, instead choosing their marks very carefully with precisely targeted ransomware to achieve their desired outcome. In addition to targeting specific companies, they are striking at the most important and lucrative parts of the network....