Active Directory Blog Terms - Attivo Networks

Active Directory

The Achilles Heel of Cybersecurity

By Tom Kellermann, Head of Cybersecurity Strategy for VMware – As geopolitical tension manifests in cyberspace, four rogue nation-states launch asymmetrical cyber-attacks; 100% prevention is impossible. In 2021 cyber cartels are hijacking the digital transformation of corporations and escalating intrusions by leveraging destructive attacks. We must modernize our defenses. Ground truth is imperative, and thus detection and response must become holistic. In most intrusions, adversaries hunt for Active Directory (AD) to escalate privileges and masquerade as authorized users. AD is the prime target in 90% of intrusions. Identity has become the new perimeter and, therefore, our Achilles heel. We must increase identity security visibility to achieve intrusion suppression. I joined the advisory board of Attivo Networks because I fundamentally believe in the dire need to automate identity compromise detection and response.

Business Security Weekly Episode #240 – Protecting Identity Services

Tony Cole, CTO, Attivo Networks, joined hosts of the Business Security Weekly podcast, Ben Carr, CISO at Qualys, Jason Albuquerque, COO at Envision Technologies, and Matt Alderman, Executive Director at CyberRisk Alliance, to discuss protecting identity services. Identity Services such as Active Directory is an area that is almost always utilized by the attacker after …

Business Security Weekly Episode #240 – Protecting Identity Services Read More »

CISA’s plans for countering disinformation, and for forming a white-hat hacker advisory group.

Carolyn Crandall, Chief Security Advocate, Attivo Network, joined Dave Bittner, Host of The CyberWire Daily Podcast. Dave Bittner: Notes on rising international tension in Eastern Europe. A watering hole campaign in Hong Kong. The U.S. and the EU have joined the Paris Call. NSO Group’s prospective CEO resigns his position before formally assuming it. Void Balaur, …

CISA’s plans for countering disinformation, and for forming a white-hat hacker advisory group. Read More »

Identity Detection and Response Technology Gives Zero Trust a Boost

By Carolyn Crandall, Chief Security Advocate, Attivo Networks Zero trust has been a hot topic in the cybersecurity community for several years, mainly because attackers have gotten better at bypassing perimeter defenses and infiltrating networks. All too often, they are free to move laterally with little fear of detection once inside. Zero-trust architecture (ZTA) provides …

Identity Detection and Response Technology Gives Zero Trust a Boost Read More »

Webinar Alert – “The Rise of Active Directory Exploits: How Enterprises Are Responding to an Increasingly Virulent Threat”

FREMONT, Calif. – November 2, 2021 – Attivo Networks®, the experts in identity security and lateral movement attack prevention, are sponsoring an Enterprise Management Associates (EMA) virtual discussion of, “The Rise of Active Directory Exploits: How Enterprises Are Responding to an Increasingly Virulent Threat.”  Microsoft’s Active Directory (AD) is the de facto authentication system used by …

Webinar Alert – “The Rise of Active Directory Exploits: How Enterprises Are Responding to an Increasingly Virulent Threat” Read More »

This Halloween, the Monsters Are Coming from Inside the Network!

Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks – Since A Nightmare on Elm Street premiered in 1984, there have been eight more Freddy Krueger movies. Jason Vorhees has starred in 11 Friday the 13th movies. Michael Myers has slashed his way through 12 Halloween movies—including the recent reboot. And of course, vampires, werewolves, ghosts, mummies, and Frankenstein have been …

This Halloween, the Monsters Are Coming from Inside the Network! Read More »

woman looking at a screen detecting lateral movement

Detection of gMSA Password Exposures

Authored by: Vikram Navali, Senior Technical Product Manager – Adversaries use various techniques to dump the credentials and obtain account information, normally as a hash or clear-text password. After obtaining a domain user/service account credentials, the adversary goes after Group Managed Service Accounts (gMSAs). The gMSAs provide enhanced security for non-interactive applications or services that run automatically on a …

Detection of gMSA Password Exposures Read More »

Partner Webinar: McAfee Enterprise & Attivo Networks: Protecting the IT Crown Jewels

Credentials are the crown jewels of IT and for the enterprise as a whole. They govern access to the network, critical systems and sensitive data. It’s no surprise that privilege escalation and credential theft are part of almost every cyber-attack and incidents involving Active Directory or Cloud account compromise are so prevalent. Protecting privileged accounts …

Partner Webinar: McAfee Enterprise & Attivo Networks: Protecting the IT Crown Jewels Read More »

Data Center Knowledge logo

Cloud Identity Is ‘New Normal’ Replacement for On-Prem Tools

With the rise of work-from-home, SaaS, IoT, cloud, mobile and edge computing, the traditional on-premises identity and authentication systems are becoming obsolete, giving way to cloud identity Today’s data center has very little in common with that of a few years ago. The old model of on-prem servers surrounded by a tough, secure perimeter is …

Cloud Identity Is ‘New Normal’ Replacement for On-Prem Tools Read More »

SecuriTIC Latin America Logo

En el contexto del ransomware, el factor humano se está volviendo un asunto inquietante

Por Juan Carlos Vázquez, Director para Latinoamérica de Attivo Networks La advertencia ha sido clara y tajante: los ataques de ransomware son cada vez más sofisticados, lo que incrementa su efectividad para causar daños severos a las empresas. Sin embargo, hay detalles que no siempre se esclarecen. ¿En qué consiste la señalada sofisticación? ¿Por qué es …

En el contexto del ransomware, el factor humano se está volviendo un asunto inquietante Read More »

Scroll to Top