Why you need to extend enterprise IT security to the mainframe

Organizations with mainframes face a unique challenge: extending consistency across the entire enterprise, including mainframe environments. The ongoing issue lies in the incompatibility of tools designed for both mainframes and enterprise settings, re… Continue reading Why you need to extend enterprise IT security to the mainframe

Microsoft Adds Two-Way Trust Relationships Support to Entra Domain Services

Microsoft has added support for two-way trust relationships in its Entra Domain Services solution. The new feature provides organizations with increased control over the management of hybrid identity environments. Microsoft Entra Domain Services is a cloud-based solution that offers managed domain services, including group policy, domain joining, LDAP, and Kerberos/NTLM authentication. This service enables organizations…

The post Microsoft Adds Two-Way Trust Relationships Support to Entra Domain Services appeared first on Petri IT Knowledgebase.

Continue reading Microsoft Adds Two-Way Trust Relationships Support to Entra Domain Services

Microsoft Entra Permissions Management Gets New Capabilities and APIs

Microsoft has announced several new features for its Entra Permissions Management service. The cloud infrastructure entitlement management (CIEM) tool enables organizations to effectively monitor and control permissions for various identities and resources across different cloud services. Microsoft Entra Permissions Management is getting a new ServiceNow integration that will let organizations manage their multi-cloud permissions. It…

The post Microsoft Entra Permissions Management Gets New Capabilities and APIs appeared first on Petri IT Knowledgebase.

Continue reading Microsoft Entra Permissions Management Gets New Capabilities and APIs

What’s New in Microsoft Entra Certificate-Based Authentication

Microsoft has detailed new features and capabilities added to its Entra certificate-based authentication (CBA) since its launch in October 2023. The company highlighted support for three additional username bindings, CBA affinity binding, CBA as Most Recently Used (MRU), and various other improvements. Microsoft Entra certificate-based authentication (CBA) helps organizations configure phishing-resistant MFA that complies with…

The post What’s New in Microsoft Entra Certificate-Based Authentication appeared first on Petri IT Knowledgebase.

Continue reading What’s New in Microsoft Entra Certificate-Based Authentication

Collaborative strategies are key to enhanced ICS security

In this Help Net Security interview, Marko Gulan, Cyber Security Consultant at Schneider Electric, discusses the complexities of safeguarding industrial control systems (ICS). Our conversation will explore the importance of cross-departmental collabora… Continue reading Collaborative strategies are key to enhanced ICS security

Business resilience becomes primary force behind cybersecurity investments

Over 80% of northern European organizations emphasize that the need to ensure business resilience is the top driver for their cybersecurity investments, according to Nixu. The report reveals both encouraging progress and increasing concerns. Alarmingly… Continue reading Business resilience becomes primary force behind cybersecurity investments

Protecting against FraudGPT, ChatGPT’s evil twin

FraudGPT is the evil counterpart to ChatGPT. Criminals use it to target businesses with phishing emails and scams with speed and accuracy like never before. The AI can be prompted to create the most realistic phishing emails, perfected down to a busine… Continue reading Protecting against FraudGPT, ChatGPT’s evil twin

How to avoid the 4 main pitfalls of cloud identity management

Securing cloud identities isn’t easy. Organizations need to complete a laundry list of actions to confirm proper configuration, ensure clear visibility into identities, determine and understand who can take what actions, and on top of it all make sure … Continue reading How to avoid the 4 main pitfalls of cloud identity management