Attivo Networks Blogs

Blogs

Protecting Your Containers from Potential Threats

Reading Time: 2 minutes  |  Published: February 19, 2021 in Blogs, Cloud
0 Comments

Written by: Vikram Navali, Senior Technical Product Manager - As more enterprises adopt a containerized approach for applications, the need for protecting containers becomes crucial. Container environments are a computing option that provides virtualization for microservice-based applications regardless of whether the target environment is a private data...

Secure Your Shared Resources from Adversaries Exploiting SMB and Windows Admin Shares

Reading Time: 3 minutes  |  Published: January 29, 2021 in Blogs, Ransomware
0 Comments

Vikram Navali, Senior Technical Product Manager  - The tactics employed by adversaries are as varied as their motives. Some prefer spear-phishing, while others make use of malware, executing targeted attacks. However, the result is inevitably the same: getting unprivileged access to shared resources like files, folders,...

Protecting Cloud Credentials

Reading Time: 3 minutes  |  Published: January 22, 2021 in Blogs, Cloud
0 Comments

Written by: Vikram Navali, Senior Technical Product Manager - Credentials are critical when it comes to controlling user access, securing an organization’s infrastructure, and safeguarding its assets. Compromised user credentials often serve as an unnoticed entry point into the network. A closer look at how attackers are...

Protecting Active Directory in the Cloud

Reading Time: 3 minutes  |  Published: January 15, 2021 in Active Directory, Blogs, Cloud
0 Comments

Written by: Joseph Salazar, Technical Marketing Engineer - As organizations transform to take advantage of new cloud offerings and remote work increasingly becomes the norm, it is no surprise that many are choosing to host their Active Directory (AD) infrastructure in the cloud.  AWS, Azure,...

Detecting Lateral Movement

Preventing Lateral Movement

Reading Time: 3 minutes  |  Published: January 6, 2021 in Blogs, Lateral Movement
0 Comments

Written by: Vikram Navali, Senior Technical Product Manager - All it takes is one compromised system to start a cyberattack. Once attackers get a foothold inside the network, they can gather information or escalate privileges to complete their mission. After gaining initial access, attackers use lateral...

Try the Award-Winning ADSecure Solution Free for 90-Days

Reading Time: < 1 minute  |  Published: December 22, 2020 in Active Directory, Attivo (Company), Blogs
0 Comments

Try the Award-Winning ADSecure Solution Free for 90-Days Start your 90-day free trial of the Attivo Networks ADSecure award-winning solution, ideal for organizations using Active Directory to authenticate and authorize users and computers in Windows domain networks. We Make it Easy and Simple No changes to Active...

Attivo Offers Limited-Time Software Use to Combat Privilege Escalation and Lateral Movement

Reading Time: 2 minutes  |  Published: December 22, 2020 in Active Directory, Blogs, ThreatDefend
0 Comments

Author: Tushar Kothari, CEO – If anyone had any doubts about whether the attackers are already inside your networks, then the last week’s events indicate that you must expect that attackers already came in through various back doors. Some notable highlights from industry and government also...