Vulnerabilities in Active Directory: The CISO’s Achilles Heel

| | Active Directory
Understanding how compromises occur is a fundamental part of forming a cybersecurity defense. With that in mind, I recently joined Andy Robbins, co-creator of the open source attack path discovery tool, BloodHound, ...
YubiKey Certificate Enrollment with SecureW2

Smart Card Authentication with Active Directory

Industry leaders are constantly looking for solutions to improve wireless network security and efficiency. Organizations must ensure their users can easily access their networks at any time without any security risks. Meanwhile, ...

Why I’m Hanging Out With the Semperis Crew

Let’s start with a little history lesson… Back in 2014, there were a series of articles calling for the dismantling and death of Active Directory (AD) for various reasons. Fast forward to ...

The Dos and Don’ts of AD Recovery

Last month I was able to catch up with my long-time friend Guido Grillenmeier, who is currently Chief Technologist at DXC Technology. In 2007-2008, Guido and I worked together, developing and delivering ...

The Dos and Don’ts of AD Recovery

Last month I was able to catch up with my long-time friend Guido Grillenmeier, who is currently Chief Technologist at DXC Technology. In 2007-2008, Guido and I worked together, developing and delivering ...

Response Required

Why organizations need to react urgently to the state of password security, according to data from 451 Research In a recent brief titled “Love ‘em or Hate ‘em, Passwords Are Here to ...
What's New: DSP 3.0

Take Back the Keys to Your Kingdom With the Latest Release of Semperis Directory Services Protector

Active Directory is foundational to everything you do and the #1 new target for attackers. Since it wasn’t originally built with today’s threats in mind, Active Directory is riddled with inherent soft ...

Why Active Directory Struggles with Remote Work

Active Directory struggles to secure and manage users working from home. As such, IT teams are looking for a solution that streamlines this process. The post Why Active Directory Struggles with Remote ...

Questions to Ask Compromised Password Monitoring Vendors

Organizations using Active Directory must update their password policies to block and detect compromised passwords, but comparing password monitoring vendors in this area can sometimes be challenging. Often, organizations are not sure ...

How Does AD Accommodate WFH?

As many organizations shift to work from home (WFH) models, IT admins wonder how AD serves remote workers. See how it stacks up here. The post How Does AD Accommodate WFH? appeared ...