Posts Tagged Cyber Security
How Deception Technology is changing the rules of the game against cyber security attackers
Posted by Darshana V. Nadkarni, Ph.D. in Big Data -Cloud -IoT-Software -Mobile -Entrepreneurship, Biotech - Medical Device - Life Science - Healthcare on September 9, 2022
Tushar Kothari, CEO of Attivo Networks will be speaking with moderator, Naveen Bisht, at TiE Silicon Valley’s #MyStory event on September 13 at 6:30 pm where Kothari will share his inspiring journey as an entrepreneur in the game changing world of Cyber Security and Identity Threat Deception technology.
The term “game changing” is used frequently in the sometimes over hyped, entrepreneurship world. But as attacker become more creative, fast and increasingly malicious, cyber threats can cause unprecedented levels of damage and cyber deception technology literally changes the rules of the game, gaining an upper edge on the attackers.
Deception technology actually entices attackers to interact with false IT assets and helps security teams to detect, analyze and defend against advanced threats. These technology solutions deceive attackers with traps and decoys and lures them in with an aim to collect information about their tactics. Until now, most solutions have aimed to minimize damage after the attack. However, deception technology helps improve preventative security controls in real time.
Kothari says, at Attivo, “we are are a company focused on detecting threats in a network with particular focus on lateral movement and privilege escalation detection and prevention. We have the industry’s best deception fabric, end to end. We can project decoys throughout the network in a very effective way and we have added focus on credential and identity protection.
Three key pillars of Attivo technology are, to provide visibility to their customers on all credentials and identity from endpoint and active directory throughout infrastructure, help customers reduce the attack surface, by eliminating exposures, and to help protect them if someone goes after an identity threat. Attivo claims to have the most comprehensive and effective portfolio in this area.
This will undoubtedly be a fascinating discussion. Register free of cost at the link below https://hub.tie.org/e/my-story-featuring-tushar-kothari and more see more information at http://www.tie.org .
Data Security Challenges of Remote Work
Posted by Darshana V. Nadkarni, Ph.D. in Big Data -Cloud -IoT-Software -Mobile -Entrepreneurship on June 5, 2020
TiEcon, Silicon Valley’s largest entrepreneurship conference, has gone virtual, this year. On June 24th, at 9 am, Chris Jones will speak on that exact topic of how virtual meetings and remote work is changing the paradigm and hidden opportunities and challenges inherent in this new paradigm.
Of all the challenges of remote work, security challenges are some of the most complex ones to navigate. In equal measure, some of the solutions may be very basic and simple and some may require sophisticated solutions but more than ever, companies need to fortify security for smooth functioning of remote work. Some of the top security challenges include cloud based threats, data exposure and theft, access compromise and anomalies, legacy appliance-based web defenses and legacy remote VPN access.
Right after the keynote by Vinod Khosla of Khosla Ventures, Chris Jones will speak on strategies that companies can adopt to enhance security for their remote workforce. Chris Jones, as Director of Cyber Security for Dell Technologies, oversees eDiscovery, Digital Forensics, Cyber Investigations, and Insider Risk Operations. Chris Jones has not only been involved in addressing insider threat problems for corporations but has also worked with the US Intelligence community and law enforcement agencies. He founded the FBI’s Cyber Profiling Team and developed behavioral profiling and psychological analysis techniques, with use of technical data analytics.
Register for Road to TiEcon2020 at https://hub.tie.org/e/road-to-tiecon-6-24 .
Reader Comments