security Tag

Health-ISAC

08:00 02 December in
0 Comments

Visit Attivo Networks booth #13 H-ISAC is a trusted community of critical infrastructure owners and operators within the Health Care and Public Health sector (HPH). The community is primarily focused on sharing timely, actionable and relevant information with each other including intelligence on threats, incidents and...

TechNet Augusta

00:00 19 August in
0 Comments

TechNet Augusta 2019 gives participants the opportunity to examine and explore the intricacies of the cyber domain. With assistance from the U.S. Army Cyber Center of Excellence and industry experts, the conference is designed to open the lines of communication and facilitate networking, education and...

Securing IoT through deception

13:39 08 August in Attivo News
0 Comments

The momentum of IoT adoption is showing no signs of slowing, and with it comes increasingly material risk for both businesses and households. The quest for innovation has allowed for security to fall behind, and as a result, these devices have infiltrated our lives while creating...

dc_logo

Data Connectors Vancouver

08:00 25 July in
0 Comments

This one-day conferences feature a Keynote Speaker Session plus 8-10 additional educational speaker sessions discussing current cybersecurity threats and solutions.  You’ll also have the chance to visit 30-60 cybersecurity exhibits. ...

DarkReadingLogo

The Rise of ‘Purple Teaming’

11:47 13 June in Attivo News
0 Comments

The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team. In 1992, the film Sneakers introduced the term "Red Team" into popular culture as actors Robert Redford, Sydney Poitier, Dan Aykroyd, David Strathairn, and River Phoenix portrayed a...

Why Threat Deception Technology Adoption is Soaring

13:57 22 April in Attivo News
0 Comments

Unlike other security solutions, Attivo focuses on detecting the threats that have bypassed perimeter security controls, which all determined attackers eventually do. Highly authentic deception traps, along with data, application, and credential lures are deployed to attract an attacker into engaging and revealing their presence....