cyber attacks Blog Terms - Attivo Networks

cyber attacks

Attivo Networks CTO Tony Cole Shares Cyber Attack Prevention Strategies During ExecutiveBiz Supply Chain Cybersecurity Forum

By Summer Myatt To hear Tony Cole’s full keynote address, including the best questions companies should ask their suppliers in order to enhance cybersecurity, visit the ExecutiveBiz Events page, where you can watch the full Supply Chain Cybersecurity: Revelations and Innovations Forum on-demand now. ExecutiveBiz Events hosted its Supply Chain Cybersecurity: Revelations and Innovations Forum on Tuesday, during which notable cybersecurity experts …

Attivo Networks CTO Tony Cole Shares Cyber Attack Prevention Strategies During ExecutiveBiz Supply Chain Cybersecurity Forum Read More »

Stitcher Logo

How to Overcome the Cyber Attack Tsunami, Strategize and Disrupt, with Attivo Network’s Carolyn Crandall

Threats are not new to business. Whenever there has been a plentiful economic prize, there have also been pirates. In the swashbuckling days, the captain and the crew were charged with protecting the merchandise on board. The difference today is the sheer volume of cyber attacks inbound to companies. Carolyn Crandall, the Chief Security Advocate …

How to Overcome the Cyber Attack Tsunami, Strategize and Disrupt, with Attivo Network’s Carolyn Crandall Read More »

It wire logo

Research finds attackers targeting Active Directory: 50% of businesses experienced an attack with >40% success

GUEST RESEARCH: Attivo Networks, the experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced the availability of a new research report conducted by Enterprise Management Associates (EMA) and commissioned in part by Attivo Networks. The report focuses on Active Directory (AD), the directory-based identity services platform used by 90% of enterprises …

Research finds attackers targeting Active Directory: 50% of businesses experienced an attack with >40% success Read More »

Help Net Security Logo

Obstacles and threats organizations face when protecting AD

Attivo Networks announced the availability of a research report conducted by Enterprise Management Associates (EMA) which focuses on Active Directory (AD), exploring the obstacles and threats organizations face when protecting AD and how they adapt to address these growing concerns. As evidence of the value that attackers place in exploiting Active Directory and the privileges it contains, …

Obstacles and threats organizations face when protecting AD Read More »

Beta news logo

Half of businesses experience attacks on Active Directory

Active Directory, the directory-based identity services platform, is used by 90 percent of enterprises worldwide making it an attractive target for hackers. New research part sponsored by Attivo Networks and conducted by Enterprise Management Associates (EMA) shows half of organizations experienced an attack on Active Directory in the last two years, with over 40 percent saying the attack was …

Half of businesses experience attacks on Active Directory Read More »

The Washington Post Logo

Cybersecurity pros want to stop talking about a ‘cyber 9/11’

For nearly two decades, government analysts have warned of a “cyber 9/11” or a “cyber Pearl Harbor” following the Sept. 11, 2001 terrorist attack, whose 20th anniversary is tomorrow. Those warnings – focused on the dangers of a catastrophic cyberattack with 9/11-level consequences – started as early as 2003 and peaked early in the Obama administration when cyberspace was beginning to …

Cybersecurity pros want to stop talking about a ‘cyber 9/11’ Read More »

Help Net Security Logo

Attivo Networks and Swimlane empower organizations to get ahead of would-be cyber attacks

Attivo Networks and Swimlane announced a technology alliance partnership that brings together privilege escalation prevention and threat lateral movement detection with security automation. The integration combines Attivo’s deception technology that deploys decoys to help hide critical assets with Swimlane’s automation platform. With this integration, security operations teams gain the ability to stay ahead of would-be attackers by identifying …

Attivo Networks and Swimlane empower organizations to get ahead of would-be cyber attacks Read More »

DZone Logo

13 Lateral Movement Tactics Security Experts Should Recognize

One of the most curious elements of this year’s Verizon Data Breach Investigations Report (DBIR) was the inclusion of the new attack pattern “system intrusions.” Representatives from Verizon identified the category as a broad one that tends to include attacks with many steps, indicating significant lateral movement within the network. Research shows that many recent …

13 Lateral Movement Tactics Security Experts Should Recognize Read More »

eWeek Logo

How ADAssessor Brings Visibility to AD Attack Surfaces

Effectively securing and protecting Active Directory (AD) is an undeniable best practice for businesses today. Especially since some 90% of the world’s enterprise organizations are using AD as their primary method for authentication and authorization. AD’s enormous market share has made it a prime target for attackers. In fact, cyberattacks on AD are so prevalent …

How ADAssessor Brings Visibility to AD Attack Surfaces Read More »

The Washington Post Logo

The Cybersecurity 202: Cyber experts give Biden top marks at six months

At his six-month mark in office, President Biden is making the right moves to ensure the United States is safer in cyberspace, according to an overwhelming majority of cybersecurity experts we polled.  Biden’s term has been marked by a string of cyber cataclysms starting with cleaning up the SolarWinds Russian espionage campaign, which was discovered …

The Cybersecurity 202: Cyber experts give Biden top marks at six months Read More »

Scroll to Top