Attivo Networks News

security Tag

Why Threat Deception Technology Adoption is Soaring

Reading Time: 3 minutes  |  Published: April 22, 2019 in Attivo News
0 Comments

Unlike other security solutions, Attivo focuses on detecting the threats that have bypassed perimeter security controls, which all determined attackers eventually do. Highly authentic deception traps, along with data, application, and credential lures are deployed to attract an attacker into engaging and revealing their presence....

enterprisers-project

Kubernetes security: 4 tips to manage risks

Reading Time: < 1 minute  |  Published: January 17, 2019 in Attivo News
0 Comments

Chris Roberts, an adviser at Attivo Networks, concurs that role-based access control (RBAC) must be enabled for robust Kubernetes security, and adds that many elements of a strong security posture remain relevant in container environments: Good policies, procedures, and controls at the user, application, and network...

Attivo Networks Logo

Attivo Networks® Announces New Leadership in UK and Ireland, Responding to Global Demand for Deception Technology

Reading Time: 2 minutes  |  Published: April 11, 2018 in Press Release
0 Comments

Attivo Networks today named security industry veteran Mark Howell as the company’s new Vice President of UK and Ireland operations. A widely respected business development leader specializing in delivering new solutions in European markets, Howell will continue to build out the company’s expanding customer and...

Popular TV cable company impacted by data breach of up to 4 million personal records

Reading Time: < 1 minute  |  Published: September 5, 2017 in Industry News
0 Comments

The personal records of up to four million Time Warner Cable customers were possibly leaked via an unsecured Amazon server. The breach, which involved more than 600GB of data (the equivalent of 20 HD movies), was discovered by Cologne, Germany-based cybersecurity firm Kromtech. Charter Communications bought...

Use Cases: Securing Applications and Data

Reading Time: < 1 minute  |  Published: May 22, 2017 in Attivo News
0 Comments

We asked 25 security professionals to provide us with some examples of use cases where they are helping clients secure applications and data. Here's what they told us: Securing Apps/Devices/APIs/IoT 1) We ensure apps that manage valuable data (personally identifiable information, healthcare data) are secure. We see...

Hackers Ran Through Holes in Swift’s Network

Reading Time: < 1 minute  |  Published: May 1, 2017 in Industry News
0 Comments

The Society for Worldwide Interbank Financial Telecommunication has James Bond-level security at the facilities it uses to move millions of bank-payment orders around the world every day. Visitors to a Swift operations center in Culpeper, Va., say their car trunks were inspected upon arrival by armed...