Research Blogs - Attivo Networks


Reading Time: 4 minutes
Register for Nov. 3 webinar, “Chris Krebs: What’s Buried in Every Breach Report that No One is Talking About” When advanced attacks are initiated toward an enterprise, several familiar tactics are almost always used to gain privilege, traverse infrastructure, and advance the goals of the ...
Read More
illustrates cybersecurity reports

Recent Reports Shed Light on Today’s Cybersecurity Priorities

Reading Time: 5 minutes
Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks - For those in the cybersecurity industry, the Verizon Data Breach Investigations Report (DBIR) is one of the most anticipated publications of the year. The report always includes interesting data and research, helping to shed light ...
Read More

DARPA Gets Serious About Tackling Dwell Time

Reading Time: 2 minutes
Written by: Carolyn Crandall, Chief Deception Officer and CMO - Dark Reading recently reported on a new Defense Advanced Research Projects Agency (DARPA)-funded research project at Georgia Tech aimed at reducing dwell time. The $12.8 million project, known as “Gnomon,” will look to establish new ...
Read More
SecurityWeek Logo

2,227 Breaches Exposed 6 Billion Records in First Half of 2017: Report

Reading Time: < 1
More than 6 billion records were exposed as a result of the 2,227 data breaches that were reported in the first six months of 2017, according to a new report from Risk Based Security. The number of publicly disclosed data compromise events through June 30 ...
Read More

Verizon 2016 Data Breach Investigation Report

Reading Time: 2 minutes
Well here we are again, and it is time to take the annual journey into our collection of real-world data breaches and information security incidents from the prior year. We have published this report nine times1 and we truly appreciate you spending your valuable time ...
Read More

Report: Healthcare Data Breaches Continue at Alarming Pace in Second Half of 2016

Reading Time: < 1
Healthcare data breaches are continuing at an alarming pace, with the second half of 2016 shaping up to have more breach incidents per month, so far, than in the first half of the year. According to the Protenus Breach Barometer report, while the first six ...
Read More

Major security predictions for 2016

Reading Time: < 1
If a week is a long time in politics, as former British Prime Minister Harold Wilson observed, a year in cybersecurity can seem like an eternity. But despite the rapid changes, many things remain constant. Check Point’s top three predicted security threats for 2015 were ...
Read More

Clearswift Insider Threat Index (CITI) – UK Edition

Reading Time: < 1
It informs decision makers on security policy, technology and process. Compiled by technology research firm Loudhouse on behalf of Clearswift Based on data from extensive research into the security priorities and awareness of over 500 IT decision makers and 4,000 employees across the UK, US, ...
Read More


Reading Time: < 1
Conpot is a low interactive server side Industrial Control Systems decoydocs designed to be easy to deploy, modify and extend. By providing a range of common industrial control protocols we created the basics to build your own system, capable to emulate complex infrastructures to convince ...
Read More

2015 Cyber Security Survey Results Infographic

Reading Time: < 1
IQPC Exchanges surveyed 54 top executives of F1000 companies to determine the top investment trends for cyber security in 2015. The titles of the respondents include: CSO, CIO, CISO, CSIRO, VP of IT Risk Management. Global Head of Strategy, and Director of Information Security.   ...
Read More

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free


Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial


  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise
Scroll to Top