Purple Knight
Purple Knight Scoring Improves Understanding of Identity System Security Vulnerabilities
Our latest Purple Knight (PK) v4.2 release introduces fundamental changes, particularly concerning the new scoring calculation. Changing from a broader approach that considered all indicators, we’ve now zeroed in on... The post ...
Semperis Offers New Protection Against Okta Breaches
In an ever-evolving digital landscape, organizations rely on robust identity protection solutions to safeguard sensitive data and maintain secure operations. For most enterprise businesses, that means protecting Active Directory and... The post ...
AD Security 101: Man-in-the-Middle Attacks
Man-in-the-middle attacks, also known as MitM attacks, are a form of eavesdropping. These attacks can pose a serious threat to organizations’ network security, particularly in environments that use Microsoft Active... The post ...

AD Security 101: Resource-Based Constraint Delegation
Resource-based constraint delegation (RBCD) is an Active Directory (AD) security feature that enables administrators to delegate permissions in order to manage resources more securely and with greater control. Introduced in... The post ...

AD Security 101: Lock Down Risky User Rights
In Active Directory (AD) environments, you can use Group Policy Objects (GPOs) to configure user rights. By using GPOs, you can easily enforce consistent user rights policies across all computers... The post ...