cloud Blog Terms - Attivo Networks


Are Your Cloud Environments Protected from Identity-Based Attacks?

By Carolyn Crandall, chief security advocate, Attivo Networks Expanded adoption of the public cloud has resulted in unanticipated security challenges, one of which has been the explosion of non-human identities. In traditional network settings, user identities in the form of individual accounts are the primary security focus. However, the public cloud provides access to applications, databases, data stores, …

Are Your Cloud Environments Protected from Identity-Based Attacks? Read More »

Help Net Security Logo

Attivo Networks IDEntitleX reduces the attack surface for identities and entitlements in the cloud

Attivo Networks announced a new Cloud Infrastructure Entitlement Management (CIEM) solution, IDEntitleX, designed to deliver visibility and reduce the attack surface for identities and entitlements in the cloud. IDEntitleX expands the company’s leadership position in providing unprecedented visibility and prevention of identity privilege escalation and lateral movement threat activity. With this new product introduction, Attivo becomes …

Attivo Networks IDEntitleX reduces the attack surface for identities and entitlements in the cloud Read More »

Protect Serverless Functions Using the Attivo Networks Solutions

Written by: Vikram Navali, Senior Technical Product Manager – Today, cloud deployments and services are mainstream business practices for many organizations. Serverless architectures allow developers to build and run applications without having to manage infrastructure. Serverless applications depend on a combination of managed cloud services and function-as-a-service (FaaS).

Hafnium Microsoft Hack– Active Exploitation of Microsoft Exchange and Lateral Movement

Written by the Attivo Research Team – Contributing members: Gorang Joshi, Anil Gupta, Saravanan Mohan – Microsoft and Volexity have confirmed the active exploitation of vulnerabilities published by Microsoft in Exchange Server. Security research has attributed the exploitation to the Advanced Persistent Threat group known as Hafnium operating out of China. After the initial compromise, Hafnium operators accessed email accounts and deployed web shells on the compromised servers, which they then used to steal data and expand the attack. Since enterprises deploy Outlook Web Access (OWA) on public networks, it enabled the group to compromise many organizations across a large set of industries, according to ThreatPost’s blog.

Cloud computing has put security configuration errors in the spotlight

The rapid deployment and expansion of cloud technology over the past year has led to a dangerous rise in misconfigurations—a vulnerability that cybercriminals are only too eager to exploit. It’s increasingly critical for organizations to identify and implement tools to protect themselves from opportunistic attackers looking to take advantage of these misconfigurations. These tools must …

Cloud computing has put security configuration errors in the spotlight Read More »

Protecting Cloud Credentials

Written by: Vikram Navali, Senior Technical Product Manager – Credentials are critical when it comes to controlling user access, securing an organization’s infrastructure, and safeguarding its assets. Compromised user credentials often serve as an unnoticed entry point into the network. A closer look at how attackers are stealing credentials using a wide range of techniques, tactics, and procedures (TTPs) helps protect the organization’s information assets and mitigate an attack’s impact.

Protecting Active Directory in the Cloud

Written by: Joseph Salazar, Technical Marketing Engineer – As organizations transform to take advantage of new cloud offerings and remote work increasingly becomes the norm, it is no surprise that many are choosing to host their Active Directory (AD) infrastructure in the cloud. AWS, Azure, and Google Cloud Platform all offer hosting services for AD. These options allow organizations to authenticate remote and on-premises users, using their enterprise infrastructure for federated authentication and authorization. What’s more, cloud-hosted AD makes it easier for organizations to manage single-sign-on authentication and authorization for both enterprise and cloud-based applications.

2021 tech predictions: The conceptual gets real

What might 2021 bring in term of technology?

Community and market experts found consensus on a few areas. First, cloud security will dominate strategies and investments even more that it did during 2020, as organizations big and small go all in on digital transformation. And second, technologies once deemed “on the horizon” – think automation, 5G and even the much hyped artificial intelligence – will officially arrive.

FS-ISAC Asia Pacific Summit

The world is focused on the next phase of the pandemic, calling it “the new normal.” We think it’s going to be everything but normal. Current risk frameworks may not be built to support the radical changes financial institutions are confronting. For example, remote work was the exception, but it has quickly become the norm. …

FS-ISAC Asia Pacific Summit Read More »

Let’s Talk Turkey: Addressing the Most Common Data Breach Causes

Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks – It’s turkey time again, and even though Thanksgiving may look a little different this year, some things stay the same. Large gatherings of friends and family may not be in the plans, but hopefully, your dinner table will still be overflowing with stuffing, mashed potatoes, and, of course, turkey (and maybe some tofurkey).

Scroll to Top