Taking a Modern Approach to AD Security ft. Commentary by WWT

Reading Time: 3 minutes
Written by: Kevin Finch, Global Security Strategist, WWT and Tony Cole, Chief Technology Officer, Attivo Networks Kevin’s Preamble: Microsoft Active Directory (AD) is adopted by more than 90% of Fortune 1000 customers today. The role that Active Directory plays within the Enterprise Architecture can range ...
Read More
Image of Tony Bradley - Proactive Defense

Deception Technology Provides a Proactive Defense that Gives You an Edge Over Attackers

Reading Time: 4 minutes
Written by: Tony Bradley, Senior Manager of Content Marketing for Alert Logic and Editor-in-Chief of TechSpective - Traditional cybersecurity is almost entirely reactive. You follow established best practices and implement security tools and processes and then you wait. You wait for an attacker you hope ...
Read More
Detecting MITM attackers

On the Shoulders of Giants?

Reading Time: 3 minutes
I’ve come a long way in my view of more traditional security controls. For the longest time, I labored under the misapprehension that endpoint solutions were just signature based and that SIEM solutions’ primary value was in retrospective analysis of breaches, rather than threat hunting ...
Read More

Deception Essentials for Cyber

Reading Time: 3 minutes
By: Edward Amoroso Years ago, I became aware of a cable TV company whose customers were ripping off pay-per-view content. One root cause involved teenagers replacing their set-top box CPU with a test version of the chip purchased from an on-line TTL dealer. Because the ...
Read More

Using Deception to Proactively Prevent the Next Equifax Breach

Reading Time: 3 minutes
Attivo Networks is proud to feature guest writers to add unique insight on notable topics Company: Bradley Strategy Group Title: Principal Analyst Author: Tony Bradley Editor-in-Chief of Xpective TechSpective PopSpective Equifax, one of the Big Three credit reporting bureaus that maintains sensitive personal and financial ...
Read More

Fortinet Fabric-Ready Partner Spotlight: Attivo Networks

Reading Time: 4 minutes
Original blog posted at: http://blog.fortinet.com/2017/04/20/fortinet-fabric-ready-partner-spotlight-attivo-networks   Q&A with Carolyn Crandall, CMO at Attivo Networks Fortinet sits down with Fabric-Ready Partner, Attivo Networks, to learn what’s top of mind for its customers, the key IT challenges they are facing, and how Attivo Networks’ approach to integrated ...
Read More

The Evolving Nature of Healthcare Network Security Threats

Reading Time: 3 minutes
Posted by Rick Reid, Healthcare Marketing Manager Aruba, a Hewlett Packard Enterprise company @arrsquared For many years, Healthcare records have been extremely valuable to the criminal world. In 2014, it was reported that Healthcare records were 10x more valuable than standard financial data – as ...
Read More

Uncertainty as a Goal of Deception in Cyber Security

Reading Time: 2 minutes
Posted by Dr. Edward G. Amoroso, Former SVP and CSO of AT&T; Current CEO of TAG Cyber, LLC. (September 8, 2016 – Hoboken, NJ) Imagine this: You are an evil cyber intruder, part of a criminal group targeting enterprise businesses for customer medical and financial ...
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free


Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial


  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top