cybersecurity Blog Terms - Page 2 of 53 - Attivo Networks

cybersecurity

Webinar: Flash Session – Di Hola a ADAssessor

Acompáñenos junto a RAN Security y escuche cómo la solución ADAssessor le puede ayudar a entender los huecos de seguridad de su Directorio Activo, reducir la superficie de ataque y obtener visibilidad de ataques en tiempo real. Flash Session – Di Hola a ADAssessor

Dark Reading

Where Is Cloud Permissions Management Headed?

Cloud permissions management (CPM) is a branch of cloud security that has emerged over the last couple of years. Its objective is to rein in any excess access rights to cloud assets, aka permissions or entitlements, which may be enjoyed by people or systems within an infrastructure. In doing so, it seeks to impose/enforce the …

Where Is Cloud Permissions Management Headed? Read More »

Webinar: Chris Krebs, What’s Buried in Every Breach Report that No One is Talking About

Former Director of the U.S. Cybersecurity Infrastructure Security Agency (CISA) and Co-Founder of Krebs Stamos Group, Christopher Krebs, will be joining Tony Cole, Chief Technology Officer of Attivo Networks for a lively “lay it on the line” fireside chat and Q&A on November 3 at 9:00 a.m. PDT. Join Chris Krebs live to learn what …

Webinar: Chris Krebs, What’s Buried in Every Breach Report that No One is Talking About Read More »

Virtual Event: FS-ISAC FinCyber Today

The pandemic brought with it a dramatic departure from traditional business models which threatened to upend the cybersecurity of the financial sector. The industry simultaneously faces rapid cloud and cryptocurrency adoption and increased supply chain risk, coupled with cross-border attacks and rapidly evolving business models in the criminal world. The best way for cybersecurity professionals …

Virtual Event: FS-ISAC FinCyber Today Read More »

Attivo Networks Detects Attack at Major Petrochemical Company

Cyber risk to industrial sectors has grown and accelerated dramatically, led by ransomware impacting industrial processes and new activity from adversaries targeting Industrial Control Systems (ICS).  According to a Dragos ICS Cybersecurity 2020 report, most of its services clients had no visibility into their ICS environments and many of their customers did not monitor for …

Attivo Networks Detects Attack at Major Petrochemical Company Read More »

Webinar Alert – “The Rise of Active Directory Exploits: How Enterprises Are Responding to an Increasingly Virulent Threat”

FREMONT, Calif. – November 2, 2021 – Attivo Networks®, the experts in identity security and lateral movement attack prevention, are sponsoring an Enterprise Management Associates (EMA) virtual discussion of, “The Rise of Active Directory Exploits: How Enterprises Are Responding to an Increasingly Virulent Threat.”  Microsoft’s Active Directory (AD) is the de facto authentication system used by …

Webinar Alert – “The Rise of Active Directory Exploits: How Enterprises Are Responding to an Increasingly Virulent Threat” Read More »

Attivo Networks® Recognized as a 2022 Best Tech Startup in Fremont

FREMONT, Calif. – Nov. 1, 2021 – Attivo Networks®, the experts in identity security and lateral movement attack prevention, announced today that Tech Tribune has recognized it as one of the Top Ten Best Tech Startups in Fremont for the fifth consecutive year. The company was selected for its demonstrated excellence in several areas, including revenue potential, leadership …

Attivo Networks® Recognized as a 2022 Best Tech Startup in Fremont Read More »

This Halloween, the Monsters Are Coming from Inside the Network!

Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks – Since A Nightmare on Elm Street premiered in 1984, there have been eight more Freddy Krueger movies. Jason Vorhees has starred in 11 Friday the 13th movies. Michael Myers has slashed his way through 12 Halloween movies—including the recent reboot. And of course, vampires, werewolves, ghosts, mummies, and Frankenstein have been …

This Halloween, the Monsters Are Coming from Inside the Network! Read More »

woman looking at a screen detecting lateral movement

Detection of gMSA Password Exposures

Authored by: Vikram Navali, Senior Technical Product Manager – Adversaries use various techniques to dump the credentials and obtain account information, normally as a hash or clear-text password. After obtaining a domain user/service account credentials, the adversary goes after Group Managed Service Accounts (gMSAs). The gMSAs provide enhanced security for non-interactive applications or services that run automatically on a …

Detection of gMSA Password Exposures Read More »

It wire logo

Governments are finally warming to address cybersecurity challenges

By Jim Cook, ANZ Regional Director, Attivo Networks  Attacks against public and private sector assets reached a crescendo in 2021, and moves are now underway to stem the tide more permanently. Cybersecurity is on the government radar and addressing it has finally become a top priority. It has taken a lot – potentially even too many …

Governments are finally warming to address cybersecurity challenges Read More »

Scroll to Top