• Categories

  • Format

Leveraging MITRE ATT&CK and Shield to Protect Active Directory

Understanding how attackers compromise AD can aid organizations in defending against them. The following analysis uses the MITRE ATT&CK and Shield matrices to identify adversary tactics, techniques, and procedures (TTPs) that target AD and the steps organizations can take to mitigate them.

Identity First Security: A Top Priority for Cloud Operations

The cloud’s significant identity & entitlement volume substantially increases security complexity & risk. Learn more in this infographic

Understanding the Most Common Lateral Movement Attack Tactics

Understanding the specific tactics attackers use is a critical part of lateral movement detection. Knowing the tactics and strategies outlined in this paper gives defenders a significant leg up to identify attackers and stop them in their tracks.

Attivo Networks Use Cases to Defeat Advanced Attackers

Check out this use case document to find out how to strategically use Attivo solutions to defeat even the most advanced threat actors.

Reduce Active Directory Exposures and Detect Live AD Attacks

Attivo Networks Active Directory Protection solutions provide continuous visibility, concealment, and misdirection for AD exposures and attacks in near-real-time. The solutions function together to detect and derail domain, device, and user-level vulnerabilities and attacks without requiring excess permissions or installation on the AD controllers.

Accelerating SolarWinds Post-Breach Incident Response for the Fastest Lateral Movement Detection

The SolarWinds breach is a prime example of an ongoing supply chain breach, and one should be aware that this has happened in the past and will happen again. The focus should be to detect the attacker’s attempts to move laterally in the network, elevate their privileges, minimize their window of opportunity, and shut them out as fast as possible.

Cost Savings of Deception Quantified

Watch this webinar with Kevin Fiscus of Deceptive Defense, Inc. and Carolyn Crandall the Chief Deception Officer and CMO of Attivo Networks where Kevin shares his research findings on the cost savings associated with deception technology.

9 Notable 2020 CISO Challenges – Are they the Same as Yours?

The world has changed in so many ways in 2020. Even with the best-laid plans and precautions, CISOs have had to quickly respond to the COVID-19 pandemic, revising strategies and transitioning from unprepared to prepared. Read on for a list of important things CISOs are tackling as they look to stay one step ahead in these rapidly changing times.

Attivo Networks Cyber Word Search

Print out this cybersecurity-focused, family-friendly word-search and race to see who can complete it first, you or your kids? In the end, we have included some useful tips to share with your young ones about how to stay safe online during this time. Have fun!

Securing The Enterprise When Employees Work Remotely

For various reasons, many companies are encouraging or being requiring to have employees to work from home. This shift in employees working in a less secure environment creates a significant opportunity for cybercriminals and reduces their time to compromise.

10 Security Projects CISOs Should Consider: Gartner Analyst

At last week’s Gartner Security Summit in National Harbor, Maryland, Gartner analyst Neil MacDonald outlined 10 cybersecurity projects that could go a long way toward reducing enterprise security risk.

GDPR with Deceptive Technology Perspective

GDPR is The General Data Protection Regulation which will radically change the data usage and protection landscape when the document comes into force on May 25th, 2018.

Deception Technology—Much more than a Honeypot

This solution brief will detail the origins of honeypots, the logic behind them, and what features ultimately inhibited their universal adoption – followed by a look into what comprises present-day deception technology, how it has evolved, and the functionalities that are catalyzing worldwide deployment and adoption.

Discussion on Deception Webinar

Learn why deception is recognized as a top 2017 security technology to consider for detecting in-network threats.

Harnessing Unparalleled Visibility in Cyber Attack Investigations

Demo of advanced forensic analysis, reporting, and how prevention system integrations expedite remediation.

What’s Lurking Deep in Your Network

Advanced techniques for finding malware lurking in corporate domains, remote offices, data centers, and in the cloud.

Know What is Lurking in Your Network

Find out how deception technology allows for in-network detection of advanced threats.

Deception for Attack Detection of IoT Devices

This document will address the security concerns with the latest in security for connected devices—deception technology.

Pre-emptive Spear Phishing Management

Learn why phishing is one of the top cyber attacks occurring, how it works, and the steps an organization can take to protect their employees.

The Role of Dynamic Deception in the Cyber Kill Chain

Learn about the challenges of today’s threat landscape and the opportunities to address holes in the cyber attack lifecycle.


Leveraging MITRE ATT&CK and Shield to Protect Active Directory

Understanding how attackers compromise AD can aid organizations in defending against them. The following analysis uses the MITRE ATT&CK and Shield matrices to identify adversary tactics, techniques, and procedures (TTPs) that target AD and the steps organizations can take to mitigate them.

Identity First Security: A Top Priority for Cloud Operations

The cloud’s significant identity & entitlement volume substantially increases security complexity & risk. Learn more in this infographic

Understanding the Most Common Lateral Movement Attack Tactics

Understanding the specific tactics attackers use is a critical part of lateral movement detection. Knowing the tactics and strategies outlined in this paper gives defenders a significant leg up to identify attackers and stop them in their tracks.

Attivo Networks Use Cases to Defeat Advanced Attackers

Check out this use case document to find out how to strategically use Attivo solutions to defeat even the most advanced threat actors.

Reduce Active Directory Exposures and Detect Live AD Attacks

Attivo Networks Active Directory Protection solutions provide continuous visibility, concealment, and misdirection for AD exposures and attacks in near-real-time. The solutions function together to detect and derail domain, device, and user-level vulnerabilities and attacks without requiring excess permissions or installation on the AD controllers.

Accelerating SolarWinds Post-Breach Incident Response for the Fastest Lateral Movement Detection

The SolarWinds breach is a prime example of an ongoing supply chain breach, and one should be aware that this has happened in the past and will happen again. The focus should be to detect the attacker’s attempts to move laterally in the network, elevate their privileges, minimize their window of opportunity, and shut them out as fast as possible.

Cost Savings of Deception Quantified

Watch this webinar with Kevin Fiscus of Deceptive Defense, Inc. and Carolyn Crandall the Chief Deception Officer and CMO of Attivo Networks where Kevin shares his research findings on the cost savings associated with deception technology.

9 Notable 2020 CISO Challenges – Are they the Same as Yours?

The world has changed in so many ways in 2020. Even with the best-laid plans and precautions, CISOs have had to quickly respond to the COVID-19 pandemic, revising strategies and transitioning from unprepared to prepared. Read on for a list of important things CISOs are tackling as they look to stay one step ahead in these rapidly changing times.

Attivo Networks Cyber Word Search

Print out this cybersecurity-focused, family-friendly word-search and race to see who can complete it first, you or your kids? In the end, we have included some useful tips to share with your young ones about how to stay safe online during this time. Have fun!

Securing The Enterprise When Employees Work Remotely

For various reasons, many companies are encouraging or being requiring to have employees to work from home. This shift in employees working in a less secure environment creates a significant opportunity for cybercriminals and reduces their time to compromise.

10 Security Projects CISOs Should Consider: Gartner Analyst

At last week’s Gartner Security Summit in National Harbor, Maryland, Gartner analyst Neil MacDonald outlined 10 cybersecurity projects that could go a long way toward reducing enterprise security risk.

GDPR with Deceptive Technology Perspective

GDPR is The General Data Protection Regulation which will radically change the data usage and protection landscape when the document comes into force on May 25th, 2018.

Deception Technology—Much more than a Honeypot

This solution brief will detail the origins of honeypots, the logic behind them, and what features ultimately inhibited their universal adoption – followed by a look into what comprises present-day deception technology, how it has evolved, and the functionalities that are catalyzing worldwide deployment and adoption.

Discussion on Deception Webinar

Learn why deception is recognized as a top 2017 security technology to consider for detecting in-network threats.

Harnessing Unparalleled Visibility in Cyber Attack Investigations

Demo of advanced forensic analysis, reporting, and how prevention system integrations expedite remediation.

What’s Lurking Deep in Your Network

Advanced techniques for finding malware lurking in corporate domains, remote offices, data centers, and in the cloud.

Know What is Lurking in Your Network

Find out how deception technology allows for in-network detection of advanced threats.

Deception for Attack Detection of IoT Devices

This document will address the security concerns with the latest in security for connected devices—deception technology.

Pre-emptive Spear Phishing Management

Learn why phishing is one of the top cyber attacks occurring, how it works, and the steps an organization can take to protect their employees.

The Role of Dynamic Deception in the Cyber Kill Chain

Learn about the challenges of today’s threat landscape and the opportunities to address holes in the cyber attack lifecycle.