Active Directory Recovery
Why I’m Hanging Out With the Semperis Crew
Let’s start with a little history lesson… Back in 2014, there were a series of articles calling for the dismantling and death of Active Directory (AD) for various reasons. Fast forward to ...
The Dos and Don’ts of AD Recovery
Last month I was able to catch up with my long-time friend Guido Grillenmeier, who is currently Chief Technologist at DXC Technology. In 2007-2008, Guido and I worked together, developing and delivering ...
The Dos and Don’ts of AD Recovery
Last month I was able to catch up with my long-time friend Guido Grillenmeier, who is currently Chief Technologist at DXC Technology. In 2007-2008, Guido and I worked together, developing and delivering ...
How To Prepare For Cyberwar: It Starts With Identity
Cyberattacks are rapidly evolving in sophistication and scale. The line between the digital and the physical realm has become more blurred. Foreign cyberattackers have used destructive malware to erase data from hard ...
How To Prepare For Cyberwar: It Starts With Identity
Cyberattacks are rapidly evolving in sophistication and scale. The line between the digital and the physical realm has become more blurred. Foreign cyberattackers have used destructive malware to erase data from hard ...
Hypervisor DC Snapshots Are No Substitute for Proper Active Directory Backups
Most organizations have virtualized some or all their AD domain controllers. Virtualized DCs have their advantages, but they also introduce risks that didn’t exist with physical servers. One of these risks is ...
Hypervisor DC Snapshots Are No Substitute for Proper Active Directory Backups
Most organizations have virtualized some or all their AD domain controllers. Virtualized DCs have their advantages, but they also introduce risks that didn’t exist with physical servers. One of these risks is ...
Upgrading to WS2016/2019? Consider a Safety Net for AD
A colleague here at Semperis recently looped me into a conversation with the manager of a large Active Directory environment running on Windows Server 2008 R2. With end of support for Windows ...
Cyber Scenarios Expose Shortcomings of BMR
Ransomware and wiper attacks are causing organizations to re-evaluate their backup and recovery capabilities. An obvious concern is whether backups are safe – for example, are they offline where they can’t be ...
NSA sounds the alarm on BlueKeep: Windows vulnerability opens the door for the next WannaCry
It’s been just over two years since WannaCry, the ransomware that exploited the EternalBlue vulnerability to infect hundreds of thousands of computers around the world and inflict an estimated $8B in damages ...

