Attivo Networks News

Industry News

SolarWinds cyber strike: Russia did it, say US and UK

Reading Time: < 1 minute  |  Published: April 16, 2021 in Industry News

The US and UK have officially attributed the SolarWinds cyber attack which affected 18,000 organisations globally to Russia’s Foreign Intelligence Service (Sluzhba Vneshney Razvedki, the SVR). In a joint advisory, the NSA, FBI and Cybersecurity & Infrastructure Security Agency (CISA) said SVR actors – known among...

Security Magazine

Tips small businesses can use to strengthen their cyber health

Reading Time: 4 minutes  |  Published: March 15, 2021 in Industry News

While cyberattacks targeting large corporations or government agencies tend to make splashy headlines, the truth is that many attackers are shifting their priorities to focus on small businesses. Unfortunately, these smaller businesses generally lack the resources and security capabilities of larger organizations. In fact, 83%...

Cybersecurity Lessons from an Unexpected Place: Martial Arts

Reading Time: 4 minutes  |  Published: February 11, 2021 in Industry News

Any martial arts enthusiast—or anyone who at least enjoys martial arts movies—is probably familiar with the concept of "tenkan," or movements that redirect the opponent's attack momentum. The modern Japanese martial art of Aikido places considerable emphasis on this concept and centers around the philosophy of overcoming...

Strengthening Zero-Trust Architecture

Reading Time: 4 minutes  |  Published: February 1, 2021 in Industry News

Organizations that want to stay ahead of cybercriminals will find that going beyond user trust and device trust is critical for outwitting their adversaries. The invention of the term "zero trust" is generally credited to former Forrester analyst John Kindervag more than a decade ago. Although...

What is deception technology

Reading Time: 4 minutes  |  Published: January 28, 2021 in Industry News

Deception technology, commonly referred to as cyber deception, is a category of security tools and techniques designed to detect and divert an attacker’s lateral movement once they are inside the network. Deception technology enables defenders to identify a wide variety of attack methods without relying on known...