What are the security risks when doing domain migration of users and computers?

We are moving users and computers/servers from an old domain to a new one within our company. The domains are managed using Active Directory.
What are the security risks, considerations, and controls I need to consider to allow a secure mi… Continue reading What are the security risks when doing domain migration of users and computers?

Get-bye: la guía infalible para despedirse de PowerShell

En la actualidad muchos administradores de sistemas siguen gestionando sus ambientes de Active Directory y otras plataformas de Windows mediante los comandos de PowerShell. Sin embargo, esta no es la única opción disponible y ya hay soluciones que ofr… Continue reading Get-bye: la guía infalible para despedirse de PowerShell

Now’s the Time to Rethink Active Directory Security

Note: This article was first published in the July 2021 issue of the monthly newsletter  Security Networking, and appears here with the permission of the publisher.      Winding back the clock 21 years to the turn of the millennium would be a strange e… Continue reading Now’s the Time to Rethink Active Directory Security

NAKIVO 10.4 helps customers protect their backup data against ransomware

NAKIVO has released 10.4 of NAKIVO Backup & Replication with a focus on the security of backup data and ransomware protection. The new features include immutable repository and two-factor authentication designed to strengthen the security of NAKIVO… Continue reading NAKIVO 10.4 helps customers protect their backup data against ransomware

5 buenas prácticas para Active Directory

La ciberseguridad no solo debe enfocarse en las amenazas externas, aquellas que provienen de terceros o actores ajenos a la compañía. En muchos casos las amenazas son internas; bien sea como acciones premeditadas, o como resultado de la negligencia o … Continue reading 5 buenas prácticas para Active Directory

How to mitigate risk of spoofing / Impersonating in OAuth Device flow ( device code flow ) in Azure AD?

I have developed C# application and hosted it as a windows service on a machine http://localhost:5000 . This application registered in `Azure Active Directory
Application is using the below details in-app configuration
"ClientId"… Continue reading How to mitigate risk of spoofing / Impersonating in OAuth Device flow ( device code flow ) in Azure AD?