cyber defense Blog Terms - Attivo Networks

cyber defense

Security Magazine Logo

Active Directory sits in a dangerous security blind spot

By Carolyn Crandall, chief security advocate, Attivo Networks The Importance of Active Directory Active Directory can be considered the GPS of the enterprise, providing authentication across resources that span the entire network. Over 90% of Global Fortune 1,000 companies use AD, making it a nearly universal authentication solution. Microsoft has estimated that threat actors attack 95 million AD …

Active Directory sits in a dangerous security blind spot Read More »

CISO Mag logo

3 Ways the Federal Government Is Using Technology to Advance Cybersecurity

By Todd Helfrich, Vice President of Federal, Attivo Networks Attivo Networks has joined hands with the federal government to implement cybersecurity technology. Learn how the government works closely with Attivo to advance cybersecurity. When it comes to cybersecurity, the federal government is putting out fires every day — and it can be exhausting. Like most …

3 Ways the Federal Government Is Using Technology to Advance Cybersecurity Read More »

11th Annual Billington CyberSecurity Summit

The 11th Billington CyberSecurity Summit, the world’s leading government cybersecurity summit, expands to a virtual, global audience in 2020. For the first time, attendees can network digitally with senior level speakers, sponsors and attendees representing industry, government and academia. Hear from the “who’s who” of cybersecurity influencers. Join us to hear Attivo Networks CTO, Tony …

11th Annual Billington CyberSecurity Summit Read More »

Attivo Networks enhances its ThreatDefend Detection Platform

The Endpoint Detection Net solution elevates security control by accurately raising alerts and taking proactive measures to derail attackers. These capabilities include early attack detection based on: • Unauthorized Active Directory queries from an endpoint. Attackers seeking information on privileged domain accounts, systems, and other high-value objects will now receive fake Active Directory results, which …

Attivo Networks enhances its ThreatDefend Detection Platform Read More »

How Deception Technology Turns the Table on Attackers with Carolyn Crandall

Historically, the odds have always been stacked in favour of cyber attackers. … Malicious actors only need to succeed once, while cybersecurity professionals need to be succeeding 100% of the time. However, one approach that is turning all of that on its head is deception technology. This style of cyber defence enables businesses to play …

How Deception Technology Turns the Table on Attackers with Carolyn Crandall Read More »

Networks Unlimited Logo

Attivo Networks® showcases need for deception technology as global cyber warfare heats up

Advanced deception technology platforms allow network operators to exercise deception-based detection through every layer of the network stack, enabling efficient detection early in the attack lifecycle. Deception solutions use decoys, bait, and lures to deceive attackers into revealing themselves, closing the ‘detection gap’ and empowering organisations to implement an active defence strategy and accelerate incident response.

Cybersecurity: How to Overcome the Ever-Changing Challenges

When the WannaCry ransomware attack was launched in May, it shocked businesspeople around the world. But security experts will tell you that it was just part of a larger, ongoing trend in which cyberattacks are constantly evolving—and becoming more sophisticated.

Dealing with cybersecurity challenges is an unending battle. But CEOs can take steps to help ensure that their organizations are ready—and a good starting point is a comprehensive view of the issue. Cybersecurity needs to encompass people, processes and technologies, says T. Casey Fleming, CEO of the BLACKOPS Partners security firm in Washington, D.C., and it needs to receive top management’s attention. “This needs to be led and driven by the CEO and board,” he says.

Scroll to Top