5 threats every Mexican company should beware of
In the network of a company without optimal cybersecurity, a careless click opens the door to horror, one that will cause multiple damages - financial, operational, reputational. ...
In the network of a company without optimal cybersecurity, a careless click opens the door to horror, one that will cause multiple damages - financial, operational, reputational. ...
Firewalls and classic solutions for endpoint security are insufficient to defend against increasingly sophisticated and targeted attacks against IT infrastructure and applications, warn the security specialists at Attivo Networks. While this combination would offer some protection against common and simple malware attacks , more sophisticated and...
From childhood, we were taught never to lie. Deception is bad and cheaters never win. ...
The days of Jesse James’s train and bank robberies and John Dillinger kicking down doors with his trademark Tommy gun may be long gone, but bank heists are alive and well in the 21st century — albeit with a new flair. Instead of dramatic physical robberies,...
Written by: Mike Parkin, Technical Marketing Engineer - Malware targeting IoT devices is nothing new. There have been some reasonably famous, or infamous, depending on your perspective, IoT targeted malware incidents. An April article on ZDNetby Danny Palmer, on the Triton malware attack in late...
Written by: Mike Parkin, Product Marketing Engineer - In the first week of February, Catalin Cimpanu at ZDNet and Kacy Zurkus at Infosecurity Magazine reported on a new malware campaign spreading primarily through China, with smaller infestations in South America and other parts of Asia. ...
The battle to keep cyber attackers from successfully compromising networks is not working, according to a recent report by threat detection company Attivo Networks. The company surveyed more than 450 cyber security professionals worldwide from August to December 2018, and more than half of the...
Attivo Networks today announced the results of the company’s 2018 Top Threat Detection Concerns and Trends Survey. This survey reveals new insights about top information security concerns related to detecting and stopping attackers, identifying which technologies are impacting attackers, shifts in time to detection, and...
Carolyn Crandall, chief deception officer for security company Attivo Networks, says, “Healthcare IT teams need tools in their arsenal that not only defend the network perimeter but also help them detect and respond to in-network threats quickly, efficiently, and effectively.” These tools, of course, include...
As medical devices incorporate connectivity, they provide greater opportunities for convenience, service, and information for consumers and companies, but also are increasingly vulnerable to cyber threats. In this environment, Attivo Networks and Becton, Dickinson and Co. (BD) have validated a deception solution for medical technology...
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.