Active Directory
Digital Spring Cleaning: Tips for a More Secure Active Directory
One of the most critical aspects of digital spring cleaning is to tidy up your password hygiene to prevent unauthorized access to accounts and sensitive data in your environment. Here are several ...
AD Security Research: Breaking Trust Transitivity
While playing with Kerberos tickets, I discovered an issue that allowed me to authenticate to other domains within an Active Directory (AD) forest across external non-transitive trusts. This means that there is ...
AD Security 101: AD Monitoring for Malicious Changes
Welcome to AD Security 101. This blog series covers essential aspects of Active Directory (AD) security, offering basic concepts, best practices, and expert advice. I’ll start with a short discussion of why ...
Identity Attack Watch: AD Security News, February 2023
As cyberattacks targeting Active Directory continue to rise, AD security, identity, and IT teams face mounting pressure to monitor the evolving AD-focused threat landscape. To help IT and identity security professionals understand ...
How Can K-12 Schools Defend Against Ransomware?
The cybersecurity challenges in the government and education space are nothing new. Such challenges soared with COVID and continue today. Unfortunately, the cyber defense of mission-critical government and education services has not ...
Identity Attack Watch: January 2023
Cyberattacks targeting Active Directory are on the upswing, putting pressure on AD, identity, and security teams to monitor the constantly shifting AD-focused threat landscape. To help IT pros better understand and guard ...
How to Build a Strong ITDR Strategy
How do you begin to build a strong Identity Threat Detection and Response (ITDR) strategy? It begins with an understanding of your unique identity environment, says Maarten Goet, Director for Cybersecurity at ...
Why You Need Continuous Password Monitoring for True Protection
Some free password policy tools out there tout password protection without actively monitoring if user credentials become compromised The post Why You Need Continuous Password Monitoring for True Protection appeared first on ...
How to Evaluate Identity Threat Detection & Response (ITDR) Solutions
As identity-based cyber threats increase, organizations are expanding their budgets to combat attacks by focusing on Identity Threat Detection and Response (ITDR) solutions—the hot topic in identity-related security. If you’re looking for ...
Identity Attack Watch: December 2022
Cyberattacks targeting Active Directory are on the upswing, putting pressure on AD, identity, and security teams to monitor the constantly shifting AD-focused threat landscape. To help IT pros better understand and guard ...