Active Directory Security

Your DORA Compliance Checklist for Identity Defence

Your DORA Compliance Checklist for Identity Defence

  • Daniel Lattimer | Area Vice President - EMEA West
  • Jan 17, 2025

This week, the European Union’s Digital Operational Resilience Act (DORA) goes into effect in an effort to provide a clear roadmap for enhancing cybersecurity across the financial services industry. All financial entities operating in or with the EU—as well as information and communication technology (ICT) providers that support such entities—are…

Why Upgrade to Lighting Intelligence from Purple Knight

Why Upgrade to Lighting Intelligence from Purple Knight

  • Huy Kha | Senior Identity & Security Architect
  • Dec 19, 2024

For organizations of any size, managing hybrid identity security across on-premises and cloud environments can be challenging. Purple Knight has long been trusted to expose risky misconfigurations. Now, Semperis—the identity security experts behind Purple Knight—offer Lightning Intelligence, a SaaS security-posture assessment tool that automates scanning to provide continuous monitoring without…

What You Need to Know about SEC Regulation S-P Requirements and Active Directory

What You Need to Know about SEC Regulation S-P Requirements and Active Directory

  • James Doggett | Semperis CISO
  • Dec 18, 2024

CISOs in the financial sector have another new regulatory challenge to contend with. Earlier this year, the U.S. Securities and Exchange Commission (SEC) adopted new cybersecurity incident response and disclosure rules, demanding new approaches to disaster recovery planning. For affected organizations, the new SEC Regulation S-P requirements demand a new…

Zerologon Exploit Explained

Zerologon Exploit Explained

  • Huy Kha | Senior Identity & Security Architect
  • Nov 15, 2024

In a Zerologon exploit, an attacker with access to a network takes advantage of a critical flaw in the Netlogon Remote Protocol (MS-NRPC) to impersonate any computer, including a domain controller (DC). This flaw is known as Zerologon—a vulnerability that can give attackers full control over a domain. What is…

Active Directory Security Measures for U.S. State and Local Government and Education

Active Directory Security Measures for U.S. State and Local Government and Education

  • Edward Amoroso
  • Oct 24, 2024

[Editor’s note: This article is a guest post by TAG CEO and founder Ed Amoroso.] Broad cybersecurity support encompasses a wide variety of obligations, ranging from compliance documentation to user training. But the most challenging—and essential—aspect of Microsoft Active Directory (AD) security involves the detection of attacks, before, during, and…

The Role of Active Directory in U.S. Public Sector Cybersecurity

The Role of Active Directory in U.S. Public Sector Cybersecurity

  • Edward Amoroso
  • Oct 18, 2024

[Editor's note: This article is a guest post by TAG CEO and founder Ed Amoroso.] Any observer of public sector cybersecurity will recognize the serious challenges in information technology (IT) protections for U.S. public sector agencies over the past few decades. Major incidents, such as the 2015 data breach at…

Password Spraying Detection in Active Directory

Password Spraying Detection in Active Directory

  • Huy Kha | Senior Identity & Security Architect
  • Sep 18, 2024

Password spraying detection is a vital ability for all organizations. In a password spraying attack, the attacker attempts to gain unauthorized access by trying a few common or weak passwords across many accounts rather than targeting a single account with many passwords. The idea is to test several passwords, hoping…

The 5 Pillars for DORA Compliance in Active Directory

The 5 Pillars for DORA Compliance in Active Directory

  • Daniel Lattimer | Area Vice President - EMEA West
  • Aug 30, 2024

The Digital Operational Resilience Act (DORA) is an incoming European Union (EU) legislative framework aimed at fortifying the operational resilience of digital systems within the financial sector. All finance entities that operate in or with the EU need to achieve DORA compliance by early 2025, as do information and communication…