Attivo Networks News

security Tag

Use Cases: Securing Applications and Data

Reading Time: < 1 minute  |  Published: May 22, 2017 in Attivo News
0 Comments

We asked 25 security professionals to provide us with some examples of use cases where they are helping clients secure applications and data. Here's what they told us: Securing Apps/Devices/APIs/IoT 1) We ensure apps that manage valuable data (personally identifiable information, healthcare data) are secure. We see...

Hackers Ran Through Holes in Swift’s Network

Reading Time: < 1 minute  |  Published: May 1, 2017 in Industry News
0 Comments

The Society for Worldwide Interbank Financial Telecommunication has James Bond-level security at the facilities it uses to move millions of bank-payment orders around the world every day. Visitors to a Swift operations center in Culpeper, Va., say their car trunks were inspected upon arrival by armed...

Attivo Networks Named a Finalist for the 2017 Tech Trailblazers Award

Reading Time: 2 minutes  |  Published: February 23, 2017 in Awards, Company Awards, Leadership Awards, Press Release
0 Comments

Fremont, CA, - Attivo Networks® announced today that Tech Trailblazers, the first independent and dedicated awards program for enterprise information technology startups, has recognized its ThreatMatrix™ technology on an elite list of finalists for the fifth edition of the Tech Trailblazers Awards in the Security...

7 Tips For Getting Your Security Budget Approved

Reading Time: < 1 minute  |  Published: January 30, 2017 in Industry News
0 Comments

'Tis the season for building budgets, and security managers are under pressure to get the funds they need to protect their organizations. Of course this is easier said than done. The road to budget approval is paved with difficult conversations between infosec professionals and business executives....

Major security predictions for 2016

Reading Time: < 1 minute  |  Published: January 29, 2016 in Research
0 Comments

If a week is a long time in politics, as former British Prime Minister Harold Wilson observed, a year in cybersecurity can seem like an eternity. But despite the rapid changes, many things remain constant. Check Point’s top three predicted security threats for 2015 were...

How Hackers Took Down a Power Grid

Reading Time: < 1 minute  |  Published: January 26, 2016 in Industry News
0 Comments

It was an unseasonably warm afternoon in Ukraine on Dec. 23 when the power suddenly went out for thousands of people in the capital, Kiev, and western parts of the country. While technicians struggled for several hours to turn the lights back on, frustrated customers...

Top security stories of 2015

Reading Time: < 1 minute  |  Published: December 28, 2015 in Industry News
0 Comments

As many as 11 million customers may have been affected by a data breach at U.S. health insurance provider Premera Blue Cross, in the second large attack against the health care industry disclosed in the last two months. The breach, discovered on Jan. 29, may have...