Research Blogs - Attivo Networks

New EMA Research Confirms Active Directory Is Under Attack

Reading Time: 4 minutes
Register for our upcoming webinar, “Visibility and Invisibility of Credential Protection” Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - Enterprise Management Associates (EMA) has now released a new research report commissioned in part by Attivo Networks. This report focused on Active Directory (AD), ...
Read More

2021 Verizon Data Breach Investigations Report Highlights Importance of In-Network Defenses

Reading Time: 5 minutes
Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - The Verizon Data Breach Investigations Report (DBIR) is always hotly anticipated by those in the cybersecurity industry, and the 2021 edition is no exception. While last year’s report analyzed data collected before the COVID-19 pandemic ...
Read More
illustrates cybersecurity reports

Recent Reports Shed Light on Today’s Cybersecurity Priorities

Reading Time: 5 minutes
Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks - For those in the cybersecurity industry, the Verizon Data Breach Investigations Report (DBIR) is one of the most anticipated publications of the year. The report always includes interesting data and research, helping to shed light ...
Read More

CISOs Weigh In: Detection Across Attack Surfaces Is their Top Priority

Reading Time: 3 minutes
Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks - Earlier this year, we worked with SINC to conduct a study on the state of cybersecurity in the United States today. The research focused on companies with over 1,000 employees and over $25 million in ...
Read More

DARPA Gets Serious About Tackling Dwell Time

Reading Time: 2 minutes
Written by: Carolyn Crandall, Chief Deception Officer and CMO - Dark Reading recently reported on a new Defense Advanced Research Projects Agency (DARPA)-funded research project at Georgia Tech aimed at reducing dwell time. The $12.8 million project, known as “Gnomon,” will look to establish new ...
Read More

Using Deception to Proactively Prevent the Next Equifax Breach

Reading Time: 3 minutes
Attivo Networks is proud to feature guest writers to add unique insight on notable topics Company: Bradley Strategy Group Title: Principal Analyst Author: Tony Bradley Editor-in-Chief of Xpective TechSpective PopSpective Equifax, one of the Big Three credit reporting bureaus that maintains sensitive personal and financial ...
Read More

New Variant of Shamoon Surfaces, Targets Saudi Arabian Organizations

Reading Time: 4 minutes
[vc_row][vc_column][vc_column_text]The end of 2016 saw the return of a familiar attack campaign that wipes the disk of any infected computer. Dubbed Shamoon 2, it appears to related to the 2012 Shamoon campaign that targeted an organization in Saudi Arabia and made use of a disk ...
Read More

Detection Budgets Rising Fast

Reading Time: 3 minutes
[vc_row parallax="" parallax_image="" row_type="row" type="full_width" anchor="" in_content_menu="" content_menu_title="" content_menu_icon="" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" section_height="" background_color="" border_color="" padding="" padding_top="" padding_bottom="" more_button_label="" less_button_label="" button_position="" color="" css_animation="" transition_delay=""][vc_column width="1/1"][vc_column_text]By Carolyn Crandall, CMO This blog has regularly covered the alarming rise in security breaches ...
Read More

Deception as a Security Discipline: Frost and Sullivan Stratecast Report

Reading Time: 4 minutes
By; Carolyn Crandall , CMO Mid 2016, Frost and Sullivan released a Stratecast report on Deception as a Security Discipline - Going on the Offensive in the Cybersecurity Battlefield. In this report, author Michael Suby, takes a close look at deception technology and speaks to ...
Read More

Uncertainty as a Goal of Deception in Cyber Security

Reading Time: 2 minutes
Posted by Dr. Edward G. Amoroso, Former SVP and CSO of AT&T; Current CEO of TAG Cyber, LLC. (September 8, 2016 – Hoboken, NJ) Imagine this: You are an evil cyber intruder, part of a criminal group targeting enterprise businesses for customer medical and financial ...
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top