Attivo Networks Blogs

Blogs

Lights, Cameras, Hack(tion)

Reading Time: 2 minutes  |  Published: March 15, 2017 in Blogs
0 Comments

It had all the makings of a blockbuster horror movie: Malicious actors, ineffective agents and plenty of cameras. However, in last week’s hack through thousands of IoT devices, the carnage was real. The irony here is that the surveillance cameras companies use to monitor events...

Measuring the Effectiveness of Your Security Controls

Reading Time: 4 minutes  |  Published: March 6, 2017 in Blogs, Threat Research
0 Comments

Performing regular assessments to determine the efficacy of security programs is foundational to understanding the reliability of programs, security gaps, compliance issues, and whether security technology is ending up as “shelfware”. To gain continued program support and funding, information security teams are expected to...

The Benefits of Deception for SCADA Environments

Reading Time: 3 minutes  |  Published: March 1, 2017 in Blogs, Energy
0 Comments

Written By: Carolyn Crandall, CMO & Chief Deception Officer -Recently, SC Magazine published an article covering several vulnerabilities that Positive Technologies found in GE supervisory control and data acquisition (SCADA) systems where an attacker could intercept passwords and disrupt utility and factory operations. While...