Microsoft Active Directory (AD) is a key target for cyberattackers. When AD goes down, so do your operations. Yet most organizations lack an AD-specific recovery plan or rely on manual recovery, which can take days if not weeks. Auditing your AD security stance and maintaining a solid incident response plan…
What do you do when your endpoint or other initial protections are breached? What do you do when intruders are already in your network and have possibly compromised your Active Directory (AD) forest? This is the true story of a ransomware attack—and how it was stopped. Join Semperis' Sean Deuby, 15-time…
Is your disaster recovery plan designed with business continuity in mind? Unless it includes specific procedures for securely recovering Active Directory (AD) and Entra ID, you might be in for a nasty shock. Secure identity system recovery is a key factor in determining how quickly your organization can get back…
Critical infrastructure organizations that manage operational technology (OT) systems or Internet of Things (IoT) devices face several challenges to effective cybersecurity, including outdated technology, the complexity of diverse environments, and an increased attack surface. Rob Ingenthron (Senior Solutions Architect, Semperis) discusses the challenges faced by organizations in healthcare, manufacturing, energy…
Ransomware and cybercrime have become top-tier threats to organizations in every industry. Securing endpoints, buying cyber insurance, even paying ransom—none of these options can prevent a business-ending attack. One step that is key to operational and business resilience: A dedicated, identity-first cybersecurity plan. Industry experts from Government Technology and Semperis…
Cyberattackers are adept at finding ways through your defenses and into identity systems like Active Directory. From there, they can move laterally, escalate privileges, access sensitive resources, and inject malware or ransomware. Implementing a layered defense that includes identity threat detection and response (ITDR) is key to protecting your operational…
What's it like, in the hours immediately following a suspected cyber incident? In this recording, we ditch jargon, and dive into the messy, chaotic reality of incident response. Our 1:1 conversation includes war stories, lessons learned, and the hard-won wisdom gained from leading organizations through the fire. We pull back…
Cyberattacks against state and local government agencies, as well as critical public infrastructure, have soared over the past few years. Is your cybersecurity strategy ready for today’s attackers? From finding ways past MFA to hiding from SIEM solutions and security logs, threat actors have become adept at bypassing endpoint and…
A secure identity system is the foundation of your Zero Trust architecture. That’s why attackers regularly target Microsoft Active Directory (AD) and Entra ID. Gaining control of these identity systems can give threat actors near-total control of all your systems, access to sensitive data, and the means to devastate your…
Cyberattacks are the most critical threat facing modern information technology. Most attacks start with identity compromise. For the past quarter century, identity in the enterprise has been synonymous with Microsoft Active Directory (AD). Therefore, AD is almost always involved in a cyberattack—either as the target or as a route to…