credential protection Blog Terms - Attivo Networks

credential protection

Visibility and Invisibility of Credential Protection: Frank Ohlhorst and Attivo Networks Unpack the How and Why

FREMONT, Calif. – October 13, 2021 – Attivo Networks®, the experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced it will host a webinar titled: “Visibility and Invisibility of Credential Protection.” Frank Ohlhorst, tech industry journalist and principal analyst for emerging and disruptive technologies and at Media Ops, and Carolyn Crandall, chief …

Visibility and Invisibility of Credential Protection: Frank Ohlhorst and Attivo Networks Unpack the How and Why Read More »

Cyber Attackers Are About to Develop Trust Issues

Written by: Kevin Hiltpold, CISSP, Federal Sr. Solutions Engineer – Trust is an integral component of expected outcomes. Employers trust employees to be productive when working from home, countries trust other countries to honor treaties and people in a relationship regaining trust after a betrayal.  Company’s spend significant resources training users on which e-mails to trust because cyber attacker instill doubt with their phishing e-mail tactics. But those that seem to have no trust issues are cyber attackers, especially with their tool sets.

Attivo Networks® Brings Identity Security to the Next Level with a New Method of Credential Protection

Company expands its Identity Detection and Response portfolio with Credential Cloaking and Policy-based Application Access FREMONT, Calif. – September 8, 2021 – Attivo Networks®, the leader in identity detection and response, today announced a revolutionary new way of protecting credentials from theft and misuse. As part of its Endpoint Detection Net (EDN) Suite, the ThreatStrike® …

Attivo Networks® Brings Identity Security to the Next Level with a New Method of Credential Protection Read More »

Protecting Cloud Credentials

Written by: Vikram Navali, Senior Technical Product Manager – Credentials are critical when it comes to controlling user access, securing an organization’s infrastructure, and safeguarding its assets. Compromised user credentials often serve as an unnoticed entry point into the network. A closer look at how attackers are stealing credentials using a wide range of techniques, tactics, and procedures (TTPs) helps protect the organization’s information assets and mitigate an attack’s impact.

Scroll to Top