Attivo_Networks-Blog-Banner-Title

Securing Human and Non-Human Identities in the Cloud

Reading Time: 3 minutes
Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - One of the most significant challenges facing cybersecurity professionals today is the need for stronger identity security. According to the most recent Verizon Data Breach Investigations Report (DBIR), 61% of all breaches now involve credential ...
Read More

Five Ways to Protect Yourself (and Your Business) from a Ransomware Attack

Reading Time: 4 minutes
Authored by: Tony Cole, CTO, Attivo Networks - I recently spoke with Authority Magazine on the topic of ransomware, and one of the questions they asked me about was how today’s organizations can best prepare for and defend against ransomware attacks. It’s a topic that ...
Read More

XDR Meets Identity Threat Detection and Response (ITDR)

Reading Time: 3 minutes
Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - Endpoint security is a significant concern for today’s organizations and has only grown more complex with institutionalizing of hybrid working. Cybercriminals are also engaging in modern attack tactics that include reusing stolen credentials, exploiting zero-day ...
Read More

As Hybrid and Cloud Deployments Grow, Protecting Azure Active Directory Is Essential

Reading Time: 3 minutes
Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - Determined attackers can almost always find their way into a network. Even the strongest perimeter protections in the world cannot stop 100% of attacks, and while firewalls and antivirus software continue to play an important ...
Read More
CISA Zero Trust Logo

New CISA Zero Trust Updates Confirm Identity’s Central Role

Reading Time: 4 minutes
Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - Achieving a “perfect” zero-trust environment isn’t easy, if even achievable. However, most experts would agree that using it as a guidepost for least privilege management and benchmarking program maturity makes is useful. Zero trust is ...
Read More

National Cyber Deception Day

Reading Time: 3 minutes
Author: Tony Cole, Attivo Networks CTO - April 1st is National Cyber Deception Day. No, this is not a setup for an April Fool’s Day joke, just the perfect time for a day already focused on deception. MITRE’s Engage team submitted an application to create ...
Read More

LAPSUS$ data breach against several high-profile victims

Reading Time: 3 minutes
Written by: Vikram Navali, Senior Senior Technical Product Manager - Over the past months, the hacking group LAPSUS$ has targeted several high-profile victims around the globe. The group claimed their responsibility for stealing data from the targeted victims, such as Microsoft, NVIDIA, Samsung, Okta, etc., ...
Read More

MITRE Engage 1.0 – A Structured Dance with Your Adversary

Reading Time: 3 minutes
Written by Kevin Hiltpold - Federal Sr. Solutions Engineer - MITRE introduced Shield in August 2020 and became vocal advocates for utilizing an active defense to defend networks and manage adversaries. For those of us already in the business of deceiving adversaries to reduce dwell ...
Read More
SENTINELONE® TO ACQUIRE ATTIVO NETWORKS

WSJ: Cyber Firm SentinelOne to Buy Attivo Networks for $616.5 Million

Reading Time: < 1
Deal comes as businesses maintain hybrid workforces and turn to cloud-based toolsBy David UbertiMarch 15, 2022 5:30 am ET  Cybersecurity company SentinelOne Inc. is buying Attivo Networks Inc. in a bid to better protect hybrid workforces that increasingly rely on cloud-based tools. Mountain View, Calif.-based ...
Read More
SENTINELONE® TO ACQUIRE ATTIVO NETWORKS

Attivo Networks to be Acquired by SentinelOne; the XDR Journey Continues!

Reading Time: 2 minutes
Written by: Tushar Kothari, CEO Today marks an historic milestone for every member of the Attivo Networks family. I am incredibly proud to share that our company has agreed to be acquired by SentinelOne! An important and highly respected integration partner of ours since 2020, ...
Read More

The Rise of Active Directory Exploits: Is it Time to Sound the Alarm?

Report by Enterprise Management Associates

This report offers a wealth of information, including additional insight into why organizations continue to use AD and how they are currently working to reduce the AD attack surface.

Zero Trust Starts With Identity: PROTECTING ACTIVE DIRECTORY

REPORT BY AITE NOVARICA RESEARCH

This research from Aite-Novarica provides recommendations for global business and technology professionals interested in Zero Trust solutions and mitigating pressing challenges related to identity and privilege management.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

AD Security Assessment

FIND EXPOSURES AND REDUCE THE ATTACK SURFACE

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Ready to find out what’s lurking in your network?

Scroll to Top