Black Hat Blog Terms - Attivo Networks

Black Hat

Attivo at Black Hat USA 2021 with SentinelOne

Hear how the Attivo Networks and SentinelOne Integration couples unparalleled endpoint security with Active Directory protection, credential theft detection and credential exposure prevention.  

Attivo Networks® Named a 2021 Top 10 Black Unicorn by Cyber Defense Magazine

Attivo Networks®, the leader in identity detection and response, today announced that Cyber Defense Magazine (CDM) has named the company a 2021 Top 10 Black Unicorn. CDM also named Carolyn Crandall, CMO and Chief Security Advocate, a winner and Sarah Ashburn, SVP of Sales and Customer Success, a finalist in the 2021 Top 10 Women in Cybersecurity.

Reflections on “Hacker Summer Camp”

At this time of year, Las Vegas turns into what many refer to as “hacker summer camp,” and the moniker is certainly a fitting one. The Black Hat 2019 conference, held August 3-8, is now in its 22nd year and drew over 20,000 security professionals from all across the country for technical training, presentations, briefings, networking, and more. BSides Las Vegas also held its annual conference from August 6-7, drawing a similar (and often overlapping) audience to help disseminate security knowledge throughout the industry. And of course, DEF CON 2019 took place from August 8-11, with security workshops, training sessions, and demo labs. For security professionals, it doesn’t get much better than this.

Black Hat 2018: Election Hacking, Active Defense, and More…

Written by: Carolyn Crandall, CMO and Chief Deception Officer – With another busy Black Hat now behind us, we’re catching our breath and reflecting on some of the key themes at this year’s event. Prior to the show, I put together a list of activities and events for attendees to look out for.I expected to see a lot of buzz on privacy, mobile, and device security around critical infrastructure, IoT, and payment systems. I also expected to see a slew of new innovations introduced to address the expanding attack surfaces and evolving exploits that organizations must deal with in the modern threatscape.

Scroll to Top