Time to Leave ADFS Behind for Authenticating in Hybrid Environments?

One of the biggest challenges of adopting cloud services is extending identity policies from the on-premises environment into the cloud. In an Active Directory (AD) environment, it might be tempting to turn to Active Directory Federation Services (ADFS… Continue reading Time to Leave ADFS Behind for Authenticating in Hybrid Environments?

Identity management and zero trust: Where to get started

The past year has taught us all a few things, from how much we value our health to what we take for granted regarding IT. The impact of the last year should be obvious, but the Verizon 2021 Data Breach Investigations Report laid it out clearly. During … Continue reading Identity management and zero trust: Where to get started

How to improve your organization’s Active Directory security posture

Active Directory (AD), a directory service developed by Microsoft for Windows domain networks, is most organizations’ primary store for employee authentication and identity management, and controls which assets / applications / systems a user has… Continue reading How to improve your organization’s Active Directory security posture

How to convince your boss that cybersecurity includes Active Directory

Preparing for and defending against a cyberattack demands Active Directory (AD) be part of a company’s overall strategy. But AD often gets overlooked in security discussions because addressing AD vulnerabilities requires executive buy-in to allocate fo… Continue reading How to convince your boss that cybersecurity includes Active Directory

The role of endpoints in the security of your network

Endpoint security is a hot topic of discussion, especially now with so many businesses shifting to remote work. First, let’s define what endpoints are. Endpoints are end-user devices like desktops, laptops, and mobile devices. They serve as points of a… Continue reading The role of endpoints in the security of your network

Top 8 Ways Attackers Can Own Active Directory

Active Directory (AD) is one of the most valuable targets for cyberattackers because it handles authentication and authorization across all enterprise resources and touches virtually everything on the network. AD is complicated to secure, and today, r… Continue reading Top 8 Ways Attackers Can Own Active Directory

How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches

In a recent webinar I co-hosted with Semperis (the folks behind the Purple Knight security assessment tool), we focused on a key common denominator across recent high-profile attacks—Active Directory. In the session “How Attackers Exploit Active Direct… Continue reading How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches