Denial Blog Terms - Attivo Networks

Denial

Why taking a layered approach delivers the best IT security protection

When it comes to cybersecurity, it’s tempting to yearn for a silver bullet – one tool that can provide complete protection against all threats. Unfortunately, that isn’t realistic and is one of the main reasons chief information security officers talk about levels of risk and risk acceptance, rather than in absolutes. Just like building a …

Why taking a layered approach delivers the best IT security protection Read More »

SC Magazine

Attackers want Active Directory privileges. Here’s how to stop them

A growing number of threat actors use advanced persistent threat (APT) tactics to progress their attacks. More and more target Active Directory (AD), domain controllers, and flaws in Kerberos tickets to find weaknesses, steal credentials, and escalate privileges. By gathering this information, attackers can gain what they need to establish a foothold, move laterally through …

Attackers want Active Directory privileges. Here’s how to stop them Read More »

Scroll to Top