Five Ways to Protect Yourself (and Your Business) from a Ransomware Attack
Reading Time: 4 minutesXDR Meets Identity Threat Detection and Response (ITDR)
Reading Time: 3 minutesAs Hybrid and Cloud Deployments Grow, Protecting Azure Active Directory Is Essential
Reading Time: 3 minutesNew CISA Zero Trust Updates Confirm Identity’s Central Role
Reading Time: 4 minutesNational Cyber Deception Day
Reading Time: 3 minutesLAPSUS$ data breach against several high-profile victims
Reading Time: 3 minutesMITRE Engage 1.0 – A Structured Dance with Your Adversary
Reading Time: 3 minutesWSJ: Cyber Firm SentinelOne to Buy Attivo Networks for $616.5 Million
Reading Time: < 1Attivo Networks to be Acquired by SentinelOne; the XDR Journey Continues!
Reading Time: 2 minutesThe Rise of Active Directory Exploits: Is it Time to Sound the Alarm?
Report by Enterprise Management Associates
This report offers a wealth of information, including additional insight into why organizations continue to use AD and how they are currently working to reduce the AD attack surface.
Zero Trust Starts With Identity: PROTECTING ACTIVE DIRECTORY
REPORT BY AITE NOVARICA RESEARCH
This research from Aite-Novarica provides recommendations for global business and technology professionals interested in Zero Trust solutions and mitigating pressing challenges related to identity and privilege management.
Newsletter Signup
AD Security Assessment
FIND EXPOSURES AND REDUCE THE ATTACK SURFACE
For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.