Preempt Blog
The latest insights and advice to keep your company protected from insider threats and breaches.
Why Insider Threat Denial is Everyone’s Problem
People don’t like to admit when they’re wrong. And really, who can blame them? Being wrong is uncomfortable, anxiety-inducing, and embarrassing. These are all feelings that people try their best to avoid ...
Red Flag Alert: Service Accounts Performing Interactive Logins
Monnia Deng | | Active Directory, black hat, Credential Compromise, insider threat, lateral movement, passwords, Privileged Accounts, Stealthy Admin
In the world of account security, we often focus on end user accounts as the weak vector vulnerable to attackers. On the contrary, we at Preempt see something that happens just as ...
Reducing Investigation Time: How to Quickly Parse True Positives
Eran Cohen | | Adaptive Response, Adaptive Threat Prevention, Conditional Access, Identity Verification, Incident Response, insider threat, Threat Mitigation, User Behavior
In the world of security operations, quickly and accurately investigating security incidents is paramount. As a result, filtering out the non-consequential incidents from the consequential incidents helps reduce the investigative time for ...
What’s New in 3.1? New Dashboard, Exciting Integrations, and A Free Product!
Monnia Deng | | Adaptive Response, Adaptive Threat Prevention, Conditional Access, continous monitoring, integration, ping, Security Efficiency, threat detection
Preempt is happy to release version 3.1, available today! Included in the release are a brand new security assessment dashboard, exciting features offering more visibility and better password and network security, new ...
Solving Log Storage: How You Can Save Money and Meet Compliance Requirements
Logs. At best: They’re a vital part of your information security strategy to “find the bad." At worst: They’re a nightmare to manage — especially when they take up so much storage ...
Security Weekly Interview: Securing Identity With Conditional Access
Monnia Deng | | Conditional Access, identity, Identity Verification, Incident Response, insider threat
Organizations often have incomplete views of who is accessing what, when, where and how across multiple applications and systems. Understanding a user and their behavior is critical to understanding corporate security risk ...
Local Admin Passwords: The Hidden Security Risk
You’re a good administrator, and you don’t take shortcuts. You adhere to information security best practices whenever possible, and you take that responsibility seriously. With that said, a hidden setting in a ...
Security Advisory: Targeting AD FS With External Brute-Force Attacks
On July 2019 Patch Tuesday, Microsoft released a patch for CVE-2019-1126, an important vulnerability discovered by Preempt Research Labs. The vulnerability discovered leads to security issues that create a wide scale denial-of-service ...
Empowering Employees to Reduce Security Incidents
Eran Cohen | | Adaptive Response, Conditional Access, Credential Compromise, Identity Verification, Incident Response, insider threat, Multi-Factor Authentication, threat detection, UEBA
In the hustle and bustle of our modern world, we can all get easily lost in the noise. One kind of noise is most frustrating for security teams: the noise of security ...
Ping + Preempt: Securing All Access In Hybrid Cloud Environments
Enterprises struggle to understand what is truly going on in their organization: what their users are doing and how to stop risky activity. Add in the complexity of a hybrid cloud environment, ...