carolyn crandall Archives - Page 4 of 16 - Attivo Networks

carolyn crandall

2022 threat predictions: Ransomware, ransomware, ransomware

Graduating from being known mostly in the tech and cybersecurity communities, ransomware made the leap into the consciousness of the public at large over the last year, thanks to attacks grabbing mainstream headlines and affecting the everyday lives of a significant number of people. Many of the cyber professionals who submitted predictions for the upcoming …

2022 threat predictions: Ransomware, ransomware, ransomware Read More »

Identity Detection and Response Technology Gives Zero Trust a Boost

By Carolyn Crandall, Chief Security Advocate, Attivo Networks Zero trust has been a hot topic in the cybersecurity community for several years, mainly because attackers have gotten better at bypassing perimeter defenses and infiltrating networks. All too often, they are free to move laterally with little fear of detection once inside. Zero-trust architecture (ZTA) provides …

Identity Detection and Response Technology Gives Zero Trust a Boost Read More »

CISA’s plans for countering disinformation, and for forming a white-hat hacker advisory group.

Carolyn Crandall, Chief Security Advocate, Attivo Network, joined Dave Bittner, Host of The CyberWire Daily Podcast. Dave Bittner: Notes on rising international tension in Eastern Europe. A watering hole campaign in Hong Kong. The U.S. and the EU have joined the Paris Call. NSO Group’s prospective CEO resigns his position before formally assuming it. Void Balaur, …

CISA’s plans for countering disinformation, and for forming a white-hat hacker advisory group. Read More »

Beyond Identity Access Management: The Next Steps in Post-Perimeter Defense

By Carolyn Crandall, Chief Security Advocate, Attivo Networks The last few years have seen an increased acceptance that traditional perimeter-based defenses such as firewalls are not enough, and that attention needs to shift to identity security. This approach focuses on verifying the identity of users with a high degree of accuracy, working on the assumption …

Beyond Identity Access Management: The Next Steps in Post-Perimeter Defense Read More »

Close Out Cybersecurity Awareness Month by Focusing on the Basics

Close Out Cybersecurity Awareness Month by Focusing on the Basics

Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks – Earlier this month, I wrote about the rise in credential-based cyberattacks and the importance of strong identity security. For Attivo Networks, Cybersecurity Awareness Month has been an opportunity to drive home the danger posed by today’s increasingly advanced attackers while also emphasizing the game-changing nature of …

Close Out Cybersecurity Awareness Month by Focusing on the Basics Read More »

Stitcher Logo

How to Overcome the Cyber Attack Tsunami, Strategize and Disrupt, with Attivo Network’s Carolyn Crandall

Threats are not new to business. Whenever there has been a plentiful economic prize, there have also been pirates. In the swashbuckling days, the captain and the crew were charged with protecting the merchandise on board. The difference today is the sheer volume of cyber attacks inbound to companies. Carolyn Crandall, the Chief Security Advocate …

How to Overcome the Cyber Attack Tsunami, Strategize and Disrupt, with Attivo Network’s Carolyn Crandall Read More »

Visibility and Invisibility of Credential Protection: Frank Ohlhorst and Attivo Networks Unpack the How and Why

FREMONT, Calif. – October 13, 2021 – Attivo Networks®, the experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced it will host a webinar titled: “Visibility and Invisibility of Credential Protection.” Frank Ohlhorst, tech industry journalist and principal analyst for emerging and disruptive technologies and at Media Ops, and Carolyn Crandall, chief …

Visibility and Invisibility of Credential Protection: Frank Ohlhorst and Attivo Networks Unpack the How and Why Read More »

It wire logo

Research finds attackers targeting Active Directory: 50% of businesses experienced an attack with >40% success

GUEST RESEARCH: Attivo Networks, the experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced the availability of a new research report conducted by Enterprise Management Associates (EMA) and commissioned in part by Attivo Networks. The report focuses on Active Directory (AD), the directory-based identity services platform used by 90% of enterprises …

Research finds attackers targeting Active Directory: 50% of businesses experienced an attack with >40% success Read More »

Help Net Security Logo

Obstacles and threats organizations face when protecting AD

Attivo Networks announced the availability of a research report conducted by Enterprise Management Associates (EMA) which focuses on Active Directory (AD), exploring the obstacles and threats organizations face when protecting AD and how they adapt to address these growing concerns. As evidence of the value that attackers place in exploiting Active Directory and the privileges it contains, …

Obstacles and threats organizations face when protecting AD Read More »

Beta news logo

Half of businesses experience attacks on Active Directory

Active Directory, the directory-based identity services platform, is used by 90 percent of enterprises worldwide making it an attractive target for hackers. New research part sponsored by Attivo Networks and conducted by Enterprise Management Associates (EMA) shows half of organizations experienced an attack on Active Directory in the last two years, with over 40 percent saying the attack was …

Half of businesses experience attacks on Active Directory Read More »

Scroll to Top