5 Essential ITDR Steps CISOs Must Know

Just as the impact of cyberattacks is not confined to the IT department, the role of the CISO has expanded beyond the security team. With organizations and analysts now acknowledging that identity is the new security perimeter, overseeing a comprehensive identity-first security strategy has become an essential CISO responsibility. What ... Read More
Download ITDR survey report

How to Evaluate Identity Threat Detection & Response (ITDR) Solutions

As identity-based cyber threats increase, organizations are expanding their budgets to combat attacks by focusing on Identity Threat Detection and Response (ITDR) solutions—the hot topic in identity-related security. If you’re looking for ITDR solutions to protect Active Directory (the most common identity system), this guide is for you. Here we’ll ... Read More
Construction Firm Strengthens its ITDR Foundation with Purple Knight

Construction Firm Strengthens its ITDR Foundation with Purple Knight

| | Active Directory
Between remote users and contractors, construction company Maple Reinders needed to get control of Active Directory (AD) user account security and shore up its Identity Threat Detection and Response (ITDR) foundation—fast. Managing AD user account sprawl Award-winning full-service construction company Maple Reinders has operated in multiple provinces across Canada for ... Read More

Missouri School District Finds, Fixes Active Directory Security Gaps

| | Active Directory
“As a K–12 environment, our Active Directory [AD] deployment is a bit unique compared to how a standard business network would look,” says John Hallenberger, systems administrator and project leader for the Fox C-6 school district. “Users are added and removed pretty much daily. Things like complex password enforcement and ... Read More

Protecting Healthcare Organizations from Ransomware Attacks

Active Directory has been a top cybersecurity tool for more than two decades. The problem with protecting AD—used by roughly 90% of the Fortune 1000 companies—from ransomware attacks is simply that it wasn’t designed for today’s security landscape. Many organizations don’t even know the full map of their deployment, making ... Read More
Protecting Public Safety with Purple Knight

Protecting Public Safety with Purple Knight

| | Active Directory
“As a public safety entity, we seem to be a target for criminal activity,” said Micah Clark, Information Technology Director at Central Utah 911 and a user of Purple Knight, a free Active Directory security assessment tool from Semperis. “Making sure that our Active Directory is hardwired, that we don’t ... Read More

Power up Azure AD Security Assessments

| | General
Want to use the free Purple Knight tool to evaluate your Azure AD  security posture? To run Purple Knight in your Azure AD environment, you need to create and update the app registration in Azure AD with a defined and consented set of application permissions for the Microsoft Graph. Semperis provides ... Read More
Purple Knight Proves Essential for Securing AD at Southern Utah University

Purple Knight Proves Essential for Securing AD at Southern Utah University

| | Active Directory
Legacy Active Directory (AD) environments are often hotbeds of cybersecurity vulnerabilities because of misconfigurations that have accumulated over time. In education organizations, the challenges of securing AD are compounded by the constant onboarding and offboarding of students and faculty. Uncovering unknown vulnerabilities in the AD environment he inherited was a ... Read More

Revisiting the Colonial Pipeline Cyberattack, One Year Later

The Colonial Pipeline cyberattack in May 2021 ranks as one of the top critical infrastructure attacks to date. At the time, Semperis Director of Services Sean Deuby predicted that the ransomware-as-a-service (RaaS) attack was an “implication of what is to come … open season on infrastructure providers.” One year later, ... Read More

Combatting a BlackCat Ransomware Active Directory Attack

The FBI has released FBI Flash CU-000167-MW warning that BlackCat/ALPHV ransomware-as-a-service (RaaS) group has compromised at least 60 entities globally. As with the majority of cyberattacks, BlackCat/ALPHV’s end game is an Active Directory attack. Top on the FBI’s list of recommended mitigations is reviewing your Active Directory environment for unrecognized ... Read More