Top Active Directory Hardening Strategies
The most recent Microsoft Digital Defense Report notes that nearly half of all Microsoft Incident Response engagements encountered insecure Active Directory configurations. Mandiant has previously reported that 9 of 10... The post Top Active Directory Hardening Strategies appeared first on Semperis ... Read More
MFA for Active Directory: An Overview
Modern information security is built on a layered defense. Each layer supports the others and presents additional obstacles to threat actors. From patch management to perimeter firewalls, each layer makes... The post MFA for Active Directory: An Overview appeared first on Semperis ... Read More
Holiday Cybersecurity Tips
The holidays are a busy time for shoppers, retail businesses—and cybercriminals. The Cybersecurity and Infrastructure Security Agency (CISA) has previously noted “an increase in highly impactful ransomware attacks occurring on... The post Holiday Cybersecurity Tips appeared first on Semperis ... Read More
Active Directory Security Best Practices (Checklist)
Within your IT infrastructure, Active Directory (AD) is the central hub for controlling access to resources and keeping your business operational. However, Active Directory’s importance to your organization puts it... The post Active Directory Security Best Practices (Checklist) appeared first on Semperis ... Read More
Active Directory Security: Top Risks & Best Practices
More than 20 years after its introduction, Microsoft Active Directory security remains integral to keeping businesses available and focused on their bottom line. In this post, learn what Active Directory... The post Active Directory Security: Top Risks & Best Practices appeared first on Semperis ... Read More
Preparing for the Future of Identity Management
Investment in identity security and identity protection has reached an all-time high. This year, the value of the global identity and access management (IAM) market is projected to reach $20.75... The post Preparing for the Future of Identity Management appeared first on Semperis ... Read More
How to Build a Strong ITDR Strategy
How do you begin to build a strong Identity Threat Detection and Response (ITDR) strategy? It begins with an understanding of your unique identity environment, says Maarten Goet, Director for Cybersecurity at Wortell and an expert in Microsoft technologies and communities. “The top identity security concern is [organizations] typically don’t ... Read More
Operational Resilience: More than Disaster Recovery
To contend with the explosion of cybercrime and its impact on business operations, many organizations are updating their disaster recovery plans to include cyber incident response. Many of the processes and guidelines in traditional disaster recovery plans have changed little in years, sometimes even in over a decade—making them ill-suited ... Read More
Identity Threat Response with Brian Desmond
Identity threat response—the initial aspect of ITDR—is gaining importance as cyberattackers continue to find new ways into victims’ environments. I recently spoke with Brian Desmond, Principal at Ravenswood Technology Group, about his experience helping organizations secure identity and protect and recover critical identity assets like Active Directory (AD). “Anything that ... Read More
A Community for Identity Professionals
The concept of identity professionals wasn’t a known or accepted profession when I first started my career in information technology (IT). We were all sysadmins who also dealt with user IDs and passwords. Times have changed. In a world of distributed work, cloud software, and a perpetually evolving threat landscape, ... Read More