Attivo Networks Blogs

Blogs

Key Detection Takeaways from the M-Trends Report. Hint: It’s not getting better.

Reading Time: 4 minutes  |  Published: June 14, 2018 in Blogs, Deception
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer and CMO Last week, we looked at the latest Verizon Data Breach Investigation Report, which outlined high-level trends across thousands of breaches and cybersecurity incidences. The report showed that despite organizations’ best efforts to get more proactive...

Verizon Data Breach Investigation Report Points to Growing Cybersecurity Threats and Failed Defenses

Reading Time: 4 minutes  |  Published: June 7, 2018 in Blogs, Cyber Breach
0 Comments

Written by: Carolyn Crandall, Attivo Networks Chief Deception Officer & CMO Today, we take a look into the annual Verizon Data Breach Investigation Report (DBIR) from Verizon Enterprise Solutions. The 2018 report examined over 53,000 incidents and 2,216 confirmed data breaches. As with past Verizon...

Looking Back on NH-ISAC ’18 Summit

Reading Time: 7 minutes  |  Published: May 30, 2018 in Blogs, Event, Healthcare, Survey
0 Comments

Written by: Carolyn Crandall, Chief Deception Officer & CMO It was great to attend the NH-ISAC 2018 Spring Summit last week in Ponte Vedra Beach, FL as Grand Round Sponsors. This year’s conference was primarily focused on fostering and building relationships within the trusted healthcare...

Industrial Control System Cybersecurity is a Critical Component of Safety, So Why Do We Leave the Door Unlocked?

Reading Time: 3 minutes  |  Published: May 17, 2018 in Blogs, Energy
0 Comments

By: Tony Cole, CTO Humans are fallible. This is a fact I wish more people would understand, especially as it relates to software development. No human can code a somewhat sophisticated program perfectly while providing the requested capabilities without generally containing a certain number...

Detecting MITM attackers

Active Defense 101

Reading Time: 3 minutes  |  Published: May 11, 2018 in Blogs, Deception
0 Comments

By: Carolyn Crandall, Chief Deception Officer/CMO From Sun Tzu to George Washington, some of the greatest military strategists in history have lived by the philosophy that “the best defense is a good offense,” and the proverb also rings true when it comes to IT...

Tony Cole -Chief Technology Officer

Observations on the Cisco Switch Attack

Reading Time: 2 minutes  |  Published: April 6, 2018 in Blogs, Deception
0 Comments

By Tony Cole Nation-states continue to probe all kinds of systems for vulnerabilities, and unfortunately they’re often successful at finding a path into almost any enterprise they want to compromise. Cisco reported this week that their Smart Install protocol was being ‘misused’ as an avenue...