Bloodhound Enterprise: securing Active Directory using graph theory

Bloodhound Enterprise: securing Active Directory using graph theory

BloodHound Enterprise: securing Active Directory using graphsPrior to my employment at SpecterOps, I hadn’t worked in the information security industry- as a result, many security related terms and concepts that were tossed around ...
AD Active Directory microservices

Securing Active Directory and Azure AD

As enterprises have shifted to the cloud, Azure AD has been the natural way to extend the Active Directory paradigm ...
Security Boulevard
Username and Password

Survey Results: The Proof is in the Passwords

Passwordless Authentication Continues to Fail to Gain Traction Authentication is a cornerstone of cybersecurity, but strategies to reduce the common pitfalls and resulting security risks haven’t evolved. In 2023, the stakes are ...
TROOPERS23: Hidden Pathways

What is Tier Zero — Part 2

What is Tier Zero — Part 2Round 2!This is Part 2 of our webinar and blog post series Defining the Undefined: What is Tier Zero.In Part 1, we gave an introduction to the topic and explained ...
ADLite Report

Transforming How MSPs, MSSPs and VARs Protect their Customers

Exposed credentials continue to be a leading cause of data breaches, making it imperative for organizations to revamp their defenses against this type of threat. Active Directory is particularly appealing to attackers; ...

Protect Active Directory Better

Keeping Active Directory out of Hackers’ Cross-Hairs Active Directory is a prime target for threat actors and companies must act now to eliminate it as a threat vector. Here’s why, and how ...
Isolate: Network traffic filtering workflow using CrowdStrike, VirusTotal, and FortiGate NGFW.

Implementing MITRE D3FEND for ATT&CK Technique T1110: Brute Force

When account credentials are unknown, attackers may use a brute force attack in order to gain access. This can occur as an early stage of their attack, to gain initial access, or ...
Resolving Shadow Admins: Achieving Maximum Impact with Minimal Effort

Resolving Shadow Admins: Achieving Maximum Impact with Minimal Effort

Shadow Admins are non-administrative users that hold sensitive privileges which effectively grant them admin-level rights. Such privileges can include direct access to resources or the ability to modify other users’ settings (for ...

A Guide to GDPR Compliance

Read the key steps an organization handling EU citizens' data should initiate if a data breach transpires to comply with GDPR. The post A Guide to GDPR Compliance appeared first on Enzoic ...

Secure Guardrails