CISO Mag Blog Terms - Attivo Networks

CISO Mag

Amid Today’s Threat Landscape, Protecting Active Directory is a CISO-Level Concern

Despite Active Directory’s critical role in today’s IT infrastructure, CISOs rarely list protecting it as a top priority. They assume that policy management and periodic audits are sufficient to cover it, and too often, it fades into the background as part of the plumbing — something they just expect to function as it should. Active …

Amid Today’s Threat Landscape, Protecting Active Directory is a CISO-Level Concern Read More »

Data Concealment: An Innovative Weapon for Every Defender’s Toolkit

Despite investments in security modernization and layered security controls, cyberattacks are consistently occurring – particularly during the COVID-19 crisis, as businesses operate with highly distributed workforces and security limitations related to remote working. … Attackers continue to successfully infiltrate corporate networks, gaining access to valuable data that they can then steal or subject to ransom …

Data Concealment: An Innovative Weapon for Every Defender’s Toolkit Read More »

Lock Down the Endpoint with Cyber Deception

Every device that connects to a network creates a security risk. There are many forms of defenses designed to protect these endpoints including anti-virus, firewalls, HIPS, endpoint detection and response (EDR), and other forms of access control. Most of these solutions require installed agents to manage authorizations and authentication, track device activities, and detect and remove viruses and malware. Despite the efforts applied to endpoint protection and EDR solutions, it is inherently insufficient. Even if you could find every endpoint, manage every agent, and keep every device consistently patched, there are fundamentally too many attack vectors to keep up with.

Scroll to Top