Cloud Blogs - Attivo Networks

Protect Serverless Functions Using the Attivo Networks Solutions

Reading Time: 2 minutes
Written by: Vikram Navali, Senior Technical Product Manager - Today, cloud deployments and services are mainstream business practices for many organizations. Serverless architectures allow developers to build and run applications without having to manage infrastructure. Serverless applications depend on a combination of managed cloud services ...
Read More

Hafnium Microsoft Hack– Active Exploitation of Microsoft Exchange and Lateral Movement

Reading Time: 2 minutes
Written by the Attivo Research Team - Contributing members: Gorang Joshi, Anil Gupta, Saravanan Mohan - Microsoft and Volexity have confirmed the active exploitation of vulnerabilities published by Microsoft in Exchange Server. Security research has attributed the exploitation to the Advanced Persistent Threat group known ...
Read More

Protecting Your Containers from Potential Threats

Reading Time: 2 minutes
Written by: Vikram Navali, Senior Technical Product Manager - As more enterprises adopt a containerized approach for applications, the need for protecting containers becomes crucial. Container environments are a computing option that provides virtualization for microservice-based applications regardless of whether the target environment is a ...
Read More

Protecting Cloud Credentials

Reading Time: 3 minutes
Written by: Vikram Navali, Senior Technical Product Manager - Credentials are critical when it comes to controlling user access, securing an organization’s infrastructure, and safeguarding its assets. Compromised user credentials often serve as an unnoticed entry point into the network. A closer look at how ...
Read More

Protecting Active Directory in the Cloud

Reading Time: 3 minutes
Written by: Joseph Salazar, Technical Marketing Engineer - As organizations transform to take advantage of new cloud offerings and remote work increasingly becomes the norm, it is no surprise that many are choosing to host their Active Directory (AD) infrastructure in the cloud. AWS, Azure, ...
Read More

Let’s Talk Turkey: Addressing the Most Common Data Breach Causes

Reading Time: 4 minutes
Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks - It’s turkey time again, and even though Thanksgiving may look a little different this year, some things stay the same. Large gatherings of friends and family may not be in the plans, but hopefully, your ...
Read More
SaaS

Attivo Solutions for SaaS Cybersecurity

Reading Time: 4 minutes
[vc_row][vc_column][vc_column_text]Written by: Zakk K, Security Architect at Attivo Networks - As the enterprise becomes more dependent on software delivered via an externally-hosted service that someone else maintains, it adds complexity to the security of what used to be a traditionally in-house application for the convenience ...
Read More

Deception to Secure Amazon S3 Buckets

Reading Time: 3 minutes
Written by: Joseph Salazar, Technical Deception Engineer - Amazon Simple Storage Service (S3 buckets) provides the ability to store and serve static content from Amazon’s cloud. Businesses use S3 to store server backups, company documents, weblogs, and publicly visible content such as web site images ...
Read More

Access Denied: The Role of Deception in Cloud ID Access Management

Reading Time: 2 minutes
Authored by: Carolyn Crandall, Chief Deception Officer - Cloud security is garnering quite a bit of attention these days, demonstrating now more than ever the need for tighter controls and visibility to when they fail. Identity and Access Management (IAM) is a topic focus for ...
Read More

More Deception in the Cloud Makes Detection Less Cloudy

Reading Time: 3 minutes
By: Carolyn Crandall This week, Attivo Networks® announced the release of an enhanced version of the ThreatDefend™ Deception and Response Platform that includes cloud data center detection support for Microsoft® Azure. This capability builds on the existing ThreatDefend support for Amazon Web Services (AWS) and ...
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top