carolyn crandall

Security Solutions logo

Identity security may never be 100% under control, but with a focus on Active Directory, many risks can be mitigated

By Carolyn Crandall, Chief Security Advocate, Attivo Networks The concept of a security perimeter has, in many cases, disappeared altogether recently. Instead, security teams rely on identity to restrict access and ensure only authorised people can connect with centralised applications and data. Indeed, a little less than a year ago, Gartner trumpeted the arrival of …

Identity security may never be 100% under control, but with a focus on Active Directory, many risks can be mitigated Read More »

It wire logo

Ransomware groups are driving Active Directory exploitation to unacceptable rates

By Carolyn Crandall, Chief Security Advocate, Attivo Networks GUEST OPINION: Moves to code Active Directory exploitation directly into malware is a growing trend and concern for security professionals. Attackers target Active Directory (AD) because it represents a skeleton key capable of unlocking the rest of a corporate network, with an estimated base of 90% of enterprises worldwide …

Ransomware groups are driving Active Directory exploitation to unacceptable rates Read More »

Hacker Noon Website Logo

How to Tell If Someone Hacked Your Active Directory

By Carolyn Crandall, Chief Security Advocate, Attivo Networks How much thought does the average person devote to the plumbing that delivers water to their home? How often do they consider the mechanics of the engine that powers their car, the modem that allows them to access the internet or even the coffee maker that delivers …

How to Tell If Someone Hacked Your Active Directory Read More »

Dark Reading

Identity Attacks Threaten Workloads, Not Just Humans

The pandemic pushed companies to accelerate their adoption of cloud services, infrastructure, and workloads to support a growing remote workforce, but the shift has redefined who represents an insider threat — nearly anyone, and any workload, with a set of credentials. No wonder, then, that attackers are increasingly taking aim at cloud services and infrastructure …

Identity Attacks Threaten Workloads, Not Just Humans Read More »

It wire logo

International Women’s Day 2022 – #BreakTheBias – comments from Australian and global tech leaders

To celebrate International Women’s Day, iTWire has received 42 submissions from top Australian and global tech leaders, celebrating women’s achievement, raising awareness against bias, and taking action for equality. At the International Women’s Day site, the theme for 2022 is #BreakTheBias, which follows on from last year’s theme of #ChooseToChallenge, which iTWire covered extensively in 2021 here and in several more articles, here. For 2022, …

International Women’s Day 2022 – #BreakTheBias – comments from Australian and global tech leaders Read More »

International Women’s Day: How tech industry leaders are breaking barriers and driving change

In celebration of International Women’s Day, we reached out to some of the leaders in the technology industry to get insights into how they are breaking the barriers to gender equality and how they are empowering women to explore opportunities in the world of tech. Multiple industry studies have made clear that diversity in the …

International Women’s Day: How tech industry leaders are breaking barriers and driving change Read More »

Attivo Networks expands Active Directory protection

A popular target of attackers, Microsoft Active Directory will receive an extra measure of protection under a new offering announced Thursday by Attivo Networks. The company’s ADSecure-DC solution expands its Active Directory protection to non-Windows endpoints. About a year ago Attivo introduced an endpoint product that could detect suspicious attempts to query Active Directory, intercept the queries, …

Attivo Networks expands Active Directory protection Read More »

Dark Reading

Rethinking Endpoint Security in 2022

By Carolyn Crandall, Chief Security Advocate, Attivo Networks Compromising an endpoint is one of the most common ways for an attacker to access an organization’s network. As more organizations grapple with the challenges of hybrid workplaces and unmanaged devices, security teams need to rethink their approach to endpoint security. Endpoint detection and response (EDR) tools …

Rethinking Endpoint Security in 2022 Read More »

Scroll to Top