Incident Response Tag

Hunting Threats with FireEye and Attivo Networks Webinar

Reading Time: < 1 minute  |  Published: August 5, 2020 in
0 Comments

Join this webinar with Chris Unick of FireEye and Joseph Salazar of Attivo Networks to reduce the time and resources required to detect threats, analyze attacks, and remediate infected endpoints, ultimately decreasing your organization’s risk of breaches and data loss. Attivo Networks® has partnered with FireEye...

Customers Asked for CrowdStrike Integrations, so We Delivered

Reading Time: 3 minutes  |  Published: July 14, 2020 in Blogs, Incident Response, Partner, Uncategorized
0 Comments

Written by: Joseph Salazar, Technical Marketing Engineer - Attivo Networks actively solicits feedback from its customers for improvements and new features they want to see.  We regularly receive requests to integrate with particular technology solutions that allow customers to better leverage the Attivo ThreatDefend® platform...

Webinar: The Role of Deception in Healthcare Networks

Reading Time: < 1 minute  |  Published: November 13, 2019 in
0 Comments

Join Errol Weiss, CISO at H-ISAC, Steve Hunter VP, Marketing at H-ISAC, and host Carolyn Crandall, Chief Deception Officer at Attivo Networks for a fireside chat on the role of deception technology in healthcare networks. The discussion will be tuned to real-world challenges and how...

Incident Response (IR) Washington DC

Reading Time: < 1 minute  |  Published: September 4, 2019 in
0 Comments

IR19 is a conference for cybersecurity professionals to learn and develop playbooks to improve Incident Response processes. 30+ hours of practical training on today’s best practices in incident response topics 36 breakout sessions designed for all levels of experience Learn practical operations tips and best...

betanews

Deception technology speeds up detection of attacks

Reading Time: < 1 minute  |  Published: August 15, 2019 in Attivo News
0 Comments

Users of deception technology report a 12X improvement in the average number of days it takes to detect attackers operating within an enterprise network. New research for Attivo Networks carried out by Enterprise Management Associates suggests attacker dwell times can be as low as 5.5 days with deception in...

IT Pro

Security Incident Response Planning: 4 Lessons Learned

Reading Time: < 1 minute  |  Published: July 21, 2019 in Attivo News
0 Comments

One of the most important, and yet easily overlooked, elements of keeping an organization secure is creating an incident recovery roadmap--also known as an incident recovery plan. As its name implies, this plan provides a course of action to be taken following a security incident....

computer weekly

GDPR: Are we there yet?

Reading Time: 2 minutes  |  Published: May 24, 2019 in Attivo News
0 Comments

They have trouble modifying their strategy to report within 72 hours. Previous directives from the EU made no specific mention of data breaches, and GDPR now sets a clear directive as to what constitutes a data breach, how the incident is to be reported and...