SolarWinds Blog Terms - Attivo Networks

SolarWinds

Cyber Strategies Talk with SolarWinds, Attivo Networks, and TAG Cyber CEOs

About this webinar Join our three industry experts – Tushar Kothari, CEO of Attivo, Sudhakar Ramakrishna, President and CEO of SolarWinds, and Ed Amoroso, CEO of TAG Cyber – as they share their personal insights and experiences on how modern organizations are using security technology and innovating to address cyber threats being levied in the …

Cyber Strategies Talk with SolarWinds, Attivo Networks, and TAG Cyber CEOs Read More »

The Top Technology Issue In The Corporate Boardroom Isn’t What You Think

Illustrating that while corporate directors are starting to look forward, protecting the value that their digital strategies and systems create is never far from mind. Tony Cole, CTO of Attivo Networks, said, “It’s time for company boards to understand that our economy is completely reliant on technology for operations. This means we require technology-savvy board …

The Top Technology Issue In The Corporate Boardroom Isn’t What You Think Read More »

SolarWinds cyber strike: Russia did it, say US and UK

The US and UK have officially attributed the SolarWinds cyber attack which affected 18,000 organisations globally to Russia’s Foreign Intelligence Service (Sluzhba Vneshney Razvedki, the SVR). In a joint advisory, the NSA, FBI and Cybersecurity & Infrastructure Security Agency (CISA) said SVR actors – known among security researchers as APT29, Cozy Bear and The Dukes …

SolarWinds cyber strike: Russia did it, say US and UK Read More »

Defense in Depth – Filling the Gaps to Detect and Stop Lateral Movement

During the SolarWinds breach, attackers had a back door into potentially thousands of networks. Typical security controls focus on detecting the initial compromise but seldom the lateral movement and privilege escalation activities that attackers spend most of their time executing. Join us for a discussion where you will see how the Attivo Networks Endpoint Detection …

Defense in Depth – Filling the Gaps to Detect and Stop Lateral Movement Read More »

What is deception technology

Deception technology, commonly referred to as cyber deception, is a category of security tools and techniques designed to detect and divert an attacker’s lateral movement once they are inside the network. Deception technology enables defenders to identify a wide variety of attack methods without relying on known signatures or pattern matching. The technology is known …

What is deception technology Read More »

The SolarWinds Attack: How to Address Lateral Movement On-Demand Webinar

Joseph Salazar, Technical Marketing Manager | Attivo Networks 22 mins The SolarWinds supply chain breach garnered much attention and concern, especially for potentially vulnerable organizations. While the compromise method was novel, analysis indicates that the attackers used typical in-network attack activities, such as credential theft, privilege escalation, discovery, and lateral movement. To defend against such …

The SolarWinds Attack: How to Address Lateral Movement On-Demand Webinar Read More »

SolarWinds Supply Chain Attack: Automating Incident Response to Detect Lateral Movement

Author: Attivo Research Team – SolarWinds issued an advisory on 13 December 2020 informing users of a sophisticated attack on its Orion Platform, an application that monitors and manages IT environments. FireEye analyzed the SolarWinds Orion Platform code compromise (dubbed SUNBURST) and shared further post-analysis details in a recently released blog.

Scroll to Top