Unconstrained Delegation in Active Directory Leaves Security Gaps

As is often the case with Active Directory, some of the worst security gaps are caused by misconfigurations that leave open doors for cyberattackers. One common setting that cybercriminals love to exploit is unconstrained delegation. What is unconstrained delegation, and why is unconstrained delegation a security risk? Delegation is the ... Read More

Active Directory Experts Have a Future in Security

| | Active Directory
Between the growth of cloud applications and a changing threat landscape, the world of a Microsoft Active Directory (AD) professional has changed significantly over the last 20-plus years. As in any other area of IT, the drive and curiosity to level up one’s skills to keep pace with evolving technologies ... Read More

The Stakes Are Higher in Healthcare: Fighting Cybercrime During a Pandemic

| | Ransomware
In the healthcare industry, cybersecurity issues have consequences that go well beyond the loss of data. Recently, the FBI and other federal agencies warned of a credible threat of “increased and imminent cybercrime” to U.S. hospitals and healthcare providers. Criminal groups target the healthcare sector to carry out “data theft ... Read More

The Dos and Don’ts of AD Recovery

Last month I was able to catch up with my long-time friend Guido Grillenmeier, who is currently Chief Technologist at DXC Technology. In 2007-2008, Guido and I worked together, developing and delivering the “Active Directory Masters of Disaster” disaster recovery workshops at the Directory Experts Conference. It was, at the ... Read More

The Dos and Don’ts of AD Recovery

Last month I was able to catch up with my long-time friend Guido Grillenmeier, who is currently Chief Technologist at DXC Technology. In 2007-2008, Guido and I worked together, developing and delivering the “Active Directory Masters of Disaster” disaster recovery workshops at the Directory Experts Conference. It was, at the ... Read More