Taking a Modern Approach to AD Security ft. Commentary by WWT
Written by: Kevin Finch, Global Security Strategist, WWT and Tony Cole, Chief Technology Officer, Attivo Networks...
Written by: Kevin Finch, Global Security Strategist, WWT and Tony Cole, Chief Technology Officer, Attivo Networks...
Written by: Tony Bradley, Senior Manager of Content Marketing for Alert Logic and Editor-in-Chief of TechSpective - Traditional cybersecurity is almost entirely reactive. You follow established best practices and implement security tools and processes and then you wait. You wait for an attacker you hope won’t...
Written by: Nick Palmer, Attivo Networks Technical Director, Europe I’ve come a long way in my view of more traditional security controls. For the longest time, I labored under the misapprehension that endpoint solutions were just signature based and that SIEM solutions’ primary value was in retrospective...
By: Edward Amoroso Years ago, I became aware of a cable TV company whose customers were ripping off pay-per-view content. One root cause involved teenagers replacing their set-top box CPU with a test version of the chip purchased from an on-line TTL dealer. Because the...
Equifax, one of the Big Three credit reporting bureaus that maintains sensitive personal and financial information on just about every adult (and many children) in America, recently revealed that it was the victim of a data breach. An estimated 143 million people had their information...
Q&A with Carolyn Crandall, CMO at Attivo NetworksFortinet sits down with Fabric-Ready Partner, Attivo Networks, to learn what’s top of mind for its customers, the key IT challenges they are facing, and how Attivo Networks’ approach to integrated security is helping drive business and customer...
For many years, Healthcare records have been extremely valuable to the criminal world. In 2014, it was reported that Healthcare records were 10x more valuable than standard financial data – as the opportunity for identity theft and medical fraud utilizing those stolen records was...
By Dr. Edward G. Amoroso, Former SVP and CSO of AT&T; Current CEO of TAG Cyber, LLC.Imagine this: You are an evil cyber intruder, part of a criminal group targeting enterprise businesses for customer medical and financial records. Your goal is to quietly steal...
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.