Hybrid Identity Protection

Why AD Modernization Is Critical to Your Cybersecurity Program

Why AD Modernization Is Critical to Your Cybersecurity Program

  • Mickey Bresman

Active Directory (AD) is the core identity store for many organizations. As such, AD has also become a major target for bad actors. If attackers gain access to AD, they gain access to any resources in the organization. In a hybrid on-prem/cloud scenario, which is common today, that includes access…

Azure Active Directory Security: 5 Ways to Secure Your AD

Azure Active Directory Security: 5 Ways to Secure Your AD

  • Eitan Bloch | Semperis Product Manager

Securing Active Directory (AD)—the common target in 9 out of 10 cyberattacks—is difficult. Many organizations have legacy AD environments with accumulated misconfigurations that attackers love to exploit. And although 90% of organizations worldwide use AD as their primary identity store, Gartner research shows that only 33% have any sort of…

AD Monitoring: AD Security 101

AD Monitoring: AD Security 101

  • Daniel Petri | Senior Training Manager

An unmanaged Active Directory (AD) can have a profound impact on your operations, leading to downtime and increasing your vulnerability to network security threats. AD monitoring can provide insights you need to ensure smooth operations, optimize performance, and safeguard your network. Welcome to AD Security 101. This blog series covers…

Identity Threat Detection and Response (ITDR) Explained

Identity Threat Detection and Response (ITDR) Explained

  • Semperis Team

User identity related threats are on the rise, requiring organizations to expand their cybersecurity budgets to focus on Identity Threat Detection and Response (ITDR) solutions. With identity-related threats such a hot topic, the Semperis team wanted to weigh in on how your security team can prevent identity attacks. If you’re…

3 Steps to Protect AD from Wiperware

3 Steps to Protect AD from Wiperware

  • Darren Mar-Elia | VP of Products

We’re barely a month into the new year, but wiperware is back in the news. DevPro Journal notes a “drastic increase” starting last year, likely driven by geopolitical conflict. What is wiperware—and how can you protect your organization? What is wiperware? Wiperware is often used as part of an advanced…

How Can K-12 Schools Defend Against Ransomware?

How Can K-12 Schools Defend Against Ransomware?

  • Jared Vichengrad

The cybersecurity challenges in the government and education space are nothing new. Such challenges soared with COVID and continue today. Unfortunately, the cyber defense of mission-critical government and education services has not always kept pace, so we still see risk from several common vulnerabilities—especially for K-12 education organizations. But with…

5 Essential ITDR Steps CISOs Must Know

5 Essential ITDR Steps CISOs Must Know

  • Semperis Team

Just as the impact of cyberattacks is not confined to the IT department, the role of the CISO has expanded beyond the security team. With organizations and analysts now acknowledging that identity is the new security perimeter, overseeing a comprehensive identity-first security strategy has become an essential CISO responsibility. What…

How to Build a Strong ITDR Strategy

How to Build a Strong ITDR Strategy

  • Sean Deuby | Principal Technologist

How do you begin to build a strong Identity Threat Detection and Response (ITDR) strategy? It begins with an understanding of your unique identity environment, says Maarten Goet, Director for Cybersecurity at Wortell and an expert in Microsoft technologies and communities. “The top identity security concern is [organizations] typically don’t…