Top Active Directory Hardening Strategies

The most recent Microsoft Digital Defense Report notes that nearly half of all Microsoft Incident Response engagements encountered insecure Active Directory configurations. Mandiant has previously reported that 9 of 10... The post Top Active Directory Hardening Strategies appeared first on Semperis ... Read More

MFA for Active Directory: An Overview

Modern information security is built on a layered defense. Each layer supports the others and presents additional obstacles to threat actors. From patch management to perimeter firewalls, each layer makes... The post MFA for Active Directory: An Overview appeared first on Semperis ... Read More

Holiday Cybersecurity Tips

The holidays are a busy time for shoppers, retail businesses—and cybercriminals. The Cybersecurity and Infrastructure Security Agency (CISA) has previously noted “an increase in highly impactful ransomware attacks occurring on... The post Holiday Cybersecurity Tips appeared first on Semperis ... Read More

Active Directory Security Best Practices (Checklist)

Within your IT infrastructure, Active Directory (AD) is the central hub for controlling access to resources and keeping your business operational. However, Active Directory’s importance to your organization puts it... The post Active Directory Security Best Practices (Checklist) appeared first on Semperis ... Read More

Active Directory Security: Top Risks & Best Practices

| | active directory security
More than 20 years after its introduction, Microsoft Active Directory security remains integral to keeping businesses available and focused on their bottom line. In this post, learn what Active Directory... The post Active Directory Security: Top Risks & Best Practices appeared first on Semperis ... Read More

Preparing for the Future of Identity Management

Investment in identity security and identity protection has reached an all-time high. This year, the value of the global identity and access management (IAM) market is projected to reach $20.75... The post Preparing for the Future of Identity Management appeared first on Semperis ... Read More

How to Build a Strong ITDR Strategy

How do you begin to build a strong Identity Threat Detection and Response (ITDR) strategy? It begins with an understanding of your unique identity environment, says Maarten Goet, Director for Cybersecurity at Wortell and an expert in Microsoft technologies and communities. “The top identity security concern is [organizations] typically don’t ... Read More

Operational Resilience: More than Disaster Recovery

To contend with the explosion of cybercrime and its impact on business operations, many organizations are updating their disaster recovery plans to include cyber incident response. Many of the processes and guidelines in traditional disaster recovery plans have changed little in years, sometimes even in over a decade—making them ill-suited ... Read More

Identity Threat Response with Brian Desmond

Identity threat response—the initial aspect of ITDR—is gaining importance as cyberattackers continue to find new ways into victims’ environments. I recently spoke with Brian Desmond, Principal at Ravenswood Technology Group, about his experience helping organizations secure identity and protect and recover critical identity assets like Active Directory (AD). “Anything that ... Read More

A Community for Identity Professionals

| | General
The concept of identity professionals wasn’t a known or accepted profession when I first started my career in information technology (IT). We were all sysadmins who also dealt with user IDs and passwords. Times have changed. In a world of distributed work, cloud software, and a perpetually evolving threat landscape, ... Read More
Loading...