Active Directory

Attivo Networks Named to Global CyberTech100 List Two Years in a Row

FREMONT, Calif. – June 8, 2021 – Attivo Networks®, the industry experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced it was named to the Global CyberTech 100 List, which honors the world’s most innovative CyberTech companies that financial institutions should know about when they develop their information security and financial crime-fighting strategies.

Active Directory: Managing Cyber Risk

By Carolyn Crandall, Chief Security Advocate, Attivo Networks. Carolyn Crandall at Attivo Network explains why 90% of organisations need an Active Directory health check. When Microsoft unveiled Active Directory (AD) way back in 1999, could anyone have known just how important it would turn out to be? Now used by roughly nine of out ten businesses in …

Active Directory: Managing Cyber Risk Read More »

Protecting Your Active Directory from AdminSDHolder Attacks

Written by: Vikram Navali, Senior Technical Product Manager – Cybercriminals often look at different methods to gain an organization’s sensitive data. One common way is to abuse the AdminSDHolder object in Active Directory. This blog discusses how attackers can add accounts with sufficient access to the AdminSDHolder object and end up gaining complete control of the Active Directory environment.

CRNtv logo

Channel Women In Security: Attivo’s Carolyn Crandall On Stopping Credential Theft, Privilege Escalation And Other Threats

Carolyn Crandall, chief security advocate and chief marketing officer at Attivo Networks, a CRN 2020 Cloud Partner Program Guide honoree—the company’s third consecutive year to receive the honor— shares with the channel how identity protection has evolved and also spotlights opportunities for women in IT security. This comes on the the heels of the drastic shift to …

Channel Women In Security: Attivo’s Carolyn Crandall On Stopping Credential Theft, Privilege Escalation And Other Threats Read More »

CyberHub Logo

Tech Corner with Carolyn Crandall, Chief Security Advocate at Attivo Networks

Carolyn Crandall, Chief Security Advocate, joins the show this week to talk about how Active directory has long been ignored and needs the attention of the security professional especially with the recent cybersecurity events that’s taken place. Our adversaries target Active Directory and with the move to Azure Active Directory we have created voids that …

Tech Corner with Carolyn Crandall, Chief Security Advocate at Attivo Networks Read More »

Security Solutions logo

How to use deception and concealment to improve IT security

By Jim Cook, ANZ Regional Director, Attivo Networks. Making use of deceptive tactics has been the game plan of cybercriminals for years. Now organisations are turning the tables and using the same techniques as a form of defence. Used in conjunction with established security strategies, deception and concealment can significantly increase the resilience of IT …

How to use deception and concealment to improve IT security Read More »

Detecting Unconstrained Delegation Exposures in AD Environment

Written by: Vikram Navali, Senior Technical Product Manager – Active Directory misconfigurations can lead to total domain compromise of an organization. Once an attacker gets a foothold on a compromised network, it can discover AD misconfigurations and gain higher-level privileges to access the domain. A typical Kerberos authentication attack scenario originates from an unconstrained delegation, where attackers identify misconfigurations and steal authentication information, such as password hashes, Kerberos tickets, and application access tokens. Attackers can escalate higher privileges and move laterally within an organization’s IT infrastructure to target high-value assets. This blog discusses what a delegation is, how attackers escalate unconstrained delegation exposure, and what security measures every organization should implement to protect itself.

Help Net Security Logo

Shedding light on the threat posed by shadow admins 

By Carolyn Crandall, Chief Security Advocate, Attivo Networks. Few organizations would purposefully hand a huge responsibility to a junior staff member before letting them fly solo on their own personal projects, but that’s effectively what happens inside too many corporate networks: organizations delegate specific administrative access to user accounts so they can do a particular …

Shedding light on the threat posed by shadow admins  Read More »

Attivo Networks Announces SentinelOne Integration To Increase Threat Protection

Attivo Networks has released a new integration for the Attivo EDN Suite with SentinelOne’s Singularity XDR platform. A new integration The Attivo Endpoint Detection Net (EDN) solution detects credential and privilege escalation attacks, then sends the alert data to the SentinelOne XDR platform, which automatically quarantines the infected endpoint. Combining the two solutions accelerates incident …

Attivo Networks Announces SentinelOne Integration To Increase Threat Protection Read More »

Scroll to Top