Digital Spring Cleaning: Tips for a More Secure Active Directory

One of the most critical aspects of digital spring cleaning is to tidy up your password hygiene to prevent unauthorized access to accounts and sensitive data in your environment. Here are several ...
Figure 1. MSRC response

AD Security Research: Breaking Trust Transitivity

While playing with Kerberos tickets, I discovered an issue that allowed me to authenticate to other domains within an Active Directory (AD) forest across external non-transitive trusts. This means that there is ...

AD Security 101: AD Monitoring for Malicious Changes

Welcome to AD Security 101. This blog series covers essential aspects of Active Directory (AD) security, offering basic concepts, best practices, and expert advice. I’ll start with a short discussion of why ...

Identity Attack Watch: AD Security News, February 2023

As cyberattacks targeting Active Directory continue to rise, AD security, identity, and IT teams face mounting pressure to monitor the evolving AD-focused threat landscape. To help IT and identity security professionals understand ...

How Can K-12 Schools Defend Against Ransomware?

The cybersecurity challenges in the government and education space are nothing new. Such challenges soared with COVID and continue today. Unfortunately, the cyber defense of mission-critical government and education services has not ...

Identity Attack Watch: January 2023

Cyberattacks targeting Active Directory are on the upswing, putting pressure on AD, identity, and security teams to monitor the constantly shifting AD-focused threat landscape. To help IT pros better understand and guard ...

How to Build a Strong ITDR Strategy

How do you begin to build a strong Identity Threat Detection and Response (ITDR) strategy? It begins with an understanding of your unique identity environment, says Maarten Goet, Director for Cybersecurity at ...

Why You Need Continuous Password Monitoring for True Protection

Some free password policy tools out there tout password protection without actively monitoring if user credentials become compromised The post Why You Need Continuous Password Monitoring for True Protection appeared first on ...
Download ITDR survey report

How to Evaluate Identity Threat Detection & Response (ITDR) Solutions

As identity-based cyber threats increase, organizations are expanding their budgets to combat attacks by focusing on Identity Threat Detection and Response (ITDR) solutions—the hot topic in identity-related security. If you’re looking for ...

Identity Attack Watch: December 2022

Cyberattacks targeting Active Directory are on the upswing, putting pressure on AD, identity, and security teams to monitor the constantly shifting AD-focused threat landscape. To help IT pros better understand and guard ...