Cloud Archives - Attivo Networks
As Hybrid and Cloud Deployments Grow

As Hybrid and Cloud Deployments Grow, Protecting Azure Active Directory Is Essential

Reading Time: 3 minutes
Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks - Determined attackers can almost always find their way into a network. Even the strongest perimeter protections in the world cannot stop 100% of attacks, and while firewalls and antivirus software continue to play an important ...
Read More
Threat Actors Targeting Cloud and Managed Service Providers

Threat Actors Targeting Cloud and Managed Service Providers

Reading Time: 3 minutes
Written by: Vikram Navali,Senior Technical Product Manager - One year after the SolarWinds supply chain attack, the cyber attackers are charging up with new tricks and campaigns. The threat groups are increasingly targeting unsecured cloud users via cloud solution providers (CSPs). Most start with credential theft, ...
Read More

Protect Serverless Functions Using the Attivo Networks Solutions

Reading Time: 2 minutes
Written by: Vikram Navali, Senior Technical Product Manager - Today, cloud deployments and services are mainstream business practices for many organizations. Serverless architectures allow developers to build and run applications without having to manage infrastructure. Serverless applications depend on a combination of managed cloud services ...
Read More

Hafnium Microsoft Hack– Active Exploitation of Microsoft Exchange and Lateral Movement

Reading Time: 2 minutes
Written by the Attivo Research Team - Contributing members: Gorang Joshi, Anil Gupta, Saravanan Mohan - Microsoft and Volexity have confirmed the active exploitation of vulnerabilities published by Microsoft in Exchange Server. Security research has attributed the exploitation to the Advanced Persistent Threat group known ...
Read More

Protecting Your Containers from Potential Threats

Reading Time: 2 minutes
Written by: Vikram Navali, Senior Technical Product Manager - As more enterprises adopt a containerized approach for applications, the need for protecting containers becomes crucial. Container environments are a computing option that provides virtualization for microservice-based applications regardless of whether the target environment is a ...
Read More

Protecting Cloud Credentials

Reading Time: 3 minutes
Written by: Vikram Navali, Senior Technical Product Manager - Credentials are critical when it comes to controlling user access, securing an organization’s infrastructure, and safeguarding its assets. Compromised user credentials often serve as an unnoticed entry point into the network. A closer look at how ...
Read More

Protecting Active Directory in the Cloud

Reading Time: 3 minutes
Written by: Joseph Salazar, Technical Marketing Engineer - As organizations transform to take advantage of new cloud offerings and remote work increasingly becomes the norm, it is no surprise that many are choosing to host their Active Directory (AD) infrastructure in the cloud. AWS, Azure, ...
Read More

Let’s Talk Turkey: Addressing the Most Common Data Breach Causes

Reading Time: 4 minutes
Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks - It’s turkey time again, and even though Thanksgiving may look a little different this year, some things stay the same. Large gatherings of friends and family may not be in the plans, but hopefully, your ...
Read More
SaaS

Attivo Solutions for SaaS Cybersecurity

Reading Time: 4 minutes
Written by: Zakk K, Security Architect at Attivo Networks - As the enterprise becomes more dependent on software delivered via an externally-hosted service that someone else maintains, it adds complexity to the security of what used to be a traditionally in-house application for the convenience ...
Read More

Deception to Secure Amazon S3 Buckets

Reading Time: 3 minutes
Written by: Joseph Salazar, Technical Deception Engineer - Amazon Simple Storage Service (S3 buckets) provides the ability to store and serve static content from Amazon’s cloud. Businesses use S3 to store server backups, company documents, weblogs, and publicly visible content such as web site images ...
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top