Active Directory Blog Terms - Page 3 of 12 - Attivo Networks

Active Directory

This Halloween, the Monsters Are Coming from Inside the Network!

Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks – Since A Nightmare on Elm Street premiered in 1984, there have been eight more Freddy Krueger movies. Jason Vorhees has starred in 11 Friday the 13th movies. Michael Myers has slashed his way through 12 Halloween movies—including the recent reboot. And of course, vampires, werewolves, ghosts, mummies, and Frankenstein have been …

This Halloween, the Monsters Are Coming from Inside the Network! Read More »

woman looking at a screen detecting lateral movement

Detection of gMSA Password Exposures

Authored by: Vikram Navali, Senior Technical Product Manager – Adversaries use various techniques to dump the credentials and obtain account information, normally as a hash or clear-text password. After obtaining a domain user/service account credentials, the adversary goes after Group Managed Service Accounts (gMSAs). The gMSAs provide enhanced security for non-interactive applications or services that run automatically on a …

Detection of gMSA Password Exposures Read More »

Partner Webinar: McAfee Enterprise & Attivo Networks: Protecting the IT Crown Jewels

Credentials are the crown jewels of IT and for the enterprise as a whole. They govern access to the network, critical systems and sensitive data. It’s no surprise that privilege escalation and credential theft are part of almost every cyber-attack and incidents involving Active Directory or Cloud account compromise are so prevalent. Protecting privileged accounts …

Partner Webinar: McAfee Enterprise & Attivo Networks: Protecting the IT Crown Jewels Read More »

Data Center Knowledge logo

Cloud Identity Is ‘New Normal’ Replacement for On-Prem Tools

With the rise of work-from-home, SaaS, IoT, cloud, mobile and edge computing, the traditional on-premises identity and authentication systems are becoming obsolete, giving way to cloud identity Today’s data center has very little in common with that of a few years ago. The old model of on-prem servers surrounded by a tough, secure perimeter is …

Cloud Identity Is ‘New Normal’ Replacement for On-Prem Tools Read More »

SecuriTIC Latin America Logo

En el contexto del ransomware, el factor humano se está volviendo un asunto inquietante

Por Juan Carlos Vázquez, Director para Latinoamérica de Attivo Networks La advertencia ha sido clara y tajante: los ataques de ransomware son cada vez más sofisticados, lo que incrementa su efectividad para causar daños severos a las empresas. Sin embargo, hay detalles que no siempre se esclarecen. ¿En qué consiste la señalada sofisticación? ¿Por qué es …

En el contexto del ransomware, el factor humano se está volviendo un asunto inquietante Read More »

Computer Weekly Logo

Mentes cibercriminales

Sobre el autor: Juan Carlos Vázquez es director para Latinoamérica de Attivo Networks. El factor humano se está volviendo un asunto inquietante en un entorno cada vez más dominado por el ransomware. La advertencia ha sido clara y tajante: los ataques de ransomware son cada vez más sofisticados, lo que incrementa su efectividad para causar daños …

Mentes cibercriminales Read More »

TAG Cyber Security Annual 4th Quarter: PREVENTING AND DETECTING LATERAL MOVEMENT

Register for Nov. 3 webinar, “Chris Krebs: What’s Buried in Every Breach Report that No One is Talking About” When advanced attacks are initiated toward an enterprise, several familiar tactics are almost always used to gain privilege, traverse infrastructure, and advance the goals of the breach. Unfortunately, these steps are rarely addressed by existing cyber …

TAG Cyber Security Annual 4th Quarter: PREVENTING AND DETECTING LATERAL MOVEMENT Read More »

Visibility and Invisibility of Credential Protection: Frank Ohlhorst and Attivo Networks Unpack the How and Why

FREMONT, Calif. – October 13, 2021 – Attivo Networks®, the experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced it will host a webinar titled: “Visibility and Invisibility of Credential Protection.” Frank Ohlhorst, tech industry journalist and principal analyst for emerging and disruptive technologies and at Media Ops, and Carolyn Crandall, chief …

Visibility and Invisibility of Credential Protection: Frank Ohlhorst and Attivo Networks Unpack the How and Why Read More »

New EMA Research Confirms Active Directory Is Under Attack

Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks – Enterprise Management Associates (EMA) has now released a new research report commissioned in part by Attivo Networks. This report focused on Active Directory (AD), the directory-based identity services platform used by more than 90% of global Fortune 1,000 companies.

Attivo stellt CIEM-Lösung vor Menschliche und nicht-menschliche Identitäten managen

Attivo Networks hat mit Identitlex eine CIEM-Lösung vorgestellt, die die Angriffsfläche von Identitäten und Berechtigungen in der Cloud reduzieren soll. Sie ermögliche eine End-to-End-Analyse von Identitäten und Berechtigungen auf Endpunkten, im Active Directory (AD) und in der Cloud. Die zunehmende Verlagerung von Applikationen in öffentliche Clouds bringt unvorhergesehene Herausforderungen für die Verwaltung und Sicherung von …

Attivo stellt CIEM-Lösung vor Menschliche und nicht-menschliche Identitäten managen Read More »

Scroll to Top