Blogs - Page 29 of 29 - Attivo Networks
Attivo Networks Blogs

Minimizing False Positives in Cloud Security Monitoring

Reading Time: 2 minutes
By: Dan Sullivan, DS Applied Engineering, Enterprise architect, research scientist, and author Monitoring security events is an essential but challenging task. Enterprises run large numbers of applications on a variety of platforms. Some applications are monolithic and run on isolated machines such as mainframes. Others ...
Read More

Time Is Not On Your Side!

Reading Time: 2 minutes
By Carolyn Crandall, CMO, Attivo Networks When The Rolling Stones sang “Time Is on My Side,” they clearly weren’t talking cyber security. Time is the friend of the cyber criminal and the enemy of IT and security teams. However, a recent report by the Ponemon ...
Read More

Why Even the Best Cyber Security Solutions Fall Short

Reading Time: 4 minutes
By Carolyn Crandall, Attivo CMO “A security solution is only as good as the weakest link” is one of those hackneyed phrases that keep popping up because it’s true. As the cyber attacks become increasingly sophisticated and numerous, the number of potential weak links also ...
Read More

Limits of Amazon Web Services Security Controls and the Need for Deception Technology

Reading Time: 2 minutes
Guest Blog By: Dan Sullivan DS Applied Engineering Enterprise architect, research scientist, and author Amazon Web Services (AWS) offers a range of robust security controls but relying solely on AWS to ensure information security is a mistake. Amazon makes clear that public clouds entail a ...
Read More

Attivo Networks Integrates Deception Technology with Juniper Networks SRX Series Firewall

Reading Time: 2 minutes
I am pleased to share that today Attivo Networks® announced that its deception-based Attivo BOTsink® solution works as an integrated solution with the Juniper Networks® SRX Series security portfolio. With this integration, the BOTsink solution now works seamlessly with Juniper Networks’ Junos® Space Security Director ...
Read More

Join Attivo and be a Champion during Cyber Security Awareness Month

Reading Time: 2 minutes
By: Carolyn Crandall, Attivo CMO Attivo Networks is proud to participate in the National Cyber Security Awareness Month (NCSAM) Champion Program. Created under the leadership of the U.S. Department of Homeland Security and the National Cyber Security Alliance, the goal of NCSAM is similar to ...
Read More

The Key to Deception Is Authenticity

Reading Time: 3 minutes
“Never attempt to win by force what can be won by deception,” said Machiavelli in The Prince. Military leaders as far back as Sun Tsu recognized the value of deception, yet only recently have cyber security professionals experienced a similar awakening. Until very recently, IT ...
Read More

“Wolf, Wolf, Wolf” – Too Much Crying, Not Enough Action

Reading Time: 3 minutes
Remember hearing the stories of “The Little Boy Who Cried Wolf”? His calls for help created alarm among the townspeople until, ultimately, they got so used to false alarms they started ignoring his cries for attention. Now imagine multiple boys crying “wolf” at the same ...
Read More

Attivo Networks Scales Deception Technology Globally

Reading Time: 2 minutes
Today we announced another first for the industry with our support for Amazon Web Services. This provides the industry’s first globally scalable deception technology solution that detects inside-the-network threats across enterprise, private and public clouds. We also announced an Attivo Central Manager, which provides a ...
Read More

With 783 Breaches Reported in 2014, Isn’t it Time to Admit That Perimeter Defense is No Longer Enough

Reading Time: 4 minutes
With 783 Breaches Reported in 2014, Isn’t it Time to Admit That Perimeter Defense is No Longer Enough The scary part is that 783 breaches only represent what was reported. Undoubtedly many more incidents occurred, but were never publically disclosed. Whether you count the disclosed ...
Read More

The Rise of Active Directory Exploits: Is it Time to Sound the Alarm?

Report by Enterprise Management Associates

This report offers a wealth of information, including additional insight into why organizations continue to use AD and how they are currently working to reduce the AD attack surface.

Zero Trust Starts With Identity: PROTECTING ACTIVE DIRECTORY

REPORT BY AITE NOVARICA RESEARCH

This research from Aite-Novarica provides recommendations for global business and technology professionals interested in Zero Trust solutions and mitigating pressing challenges related to identity and privilege management.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

AD Security Assessment

FIND EXPOSURES AND REDUCE THE ATTACK SURFACE

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Ready to find out what’s lurking in your network?

Scroll to Top