So You’ve Been Breached – What Now?

So You’ve Been Breached – What Now?

Attacks are inevitable and breaches are probable, particularly where your Active Directory is concerned. What is the correct path to take if you have been attacked? Join breach prevention and incident response experts from Semperis as they provide best practices to ensure you recover quickly, completely, and in a more…

Ransomware, Risiko und Wiederherstellung

Ransomware, Risiko und Wiederherstellung

Ist Ihr zentrales Identitätssystem darauf vorbereitet?

Back to Basics – A Practical Guide to Following the NIST Framework for Ransomware Risk Management

Back to Basics – A Practical Guide to Following the NIST Framework for Ransomware Risk Management

We all know that ransomware is everywhere and not going away any time soon. Many organizations — from government entities to regulatory bodies and even cybersecurity experts — have provided recommendations, requirements, and mandates to help you protect your organization from the relentless pace of attacks. But making this guidance…

Defending Against Active Directory Attacks That Leave No Trace

Defending Against Active Directory Attacks That Leave No Trace

Detecting an in-progress cyberattack is an essential component of any security strategy. But it's getting increasingly harder to spot malicious attackers who gain access to information systems through gaps in the identity system, then move stealthily through the environment—often undetected for weeks or months—before dropping malware. To detect identity system…

Protect Your Hybrid AD Environment

Protect Your Hybrid AD Environment

Uncover the differences between Azure Active Directory and Active Directory. Understanding the differences between these two permission models is key to preparing and protecting your security infrastructure in hybrid environments.

Applying the MITRE ATT&CK Framework to Your Active Directory

Applying the MITRE ATT&CK Framework to Your Active Directory

With the accelerating pace and increasing sophistication of cyberattacks, having a common framework for your security strategy helps you cope with the changing threat landscape. The MITRE ATT&CK Framework is one of the most popular and comprehensive tools for building a comprehensive security plan. However, the gap is wide between…

Understanding and Protecting Kerberos – The Soft Underbelly of Cybersecurity

Understanding and Protecting Kerberos – The Soft Underbelly of Cybersecurity

With the advent of Active Directory more than 20 years ago, the Kerberos protocol was a game-changer in terms of security, unification, and moving AD into the realm of identity management. But times have changed. Newer and more sophisticated attack methods and the move to the cloud have left Kerberos…

The Top 10 Actions Every Organization Should Take to Protect their AD from Attacks

The Top 10 Actions Every Organization Should Take to Protect their AD from Attacks

You know that cyber-attacks are coming. Maybe you’ve already been hit. Almost every attack is centered on finding a foothold in Active Directory, escalating privileges, and wreaking havoc. But did you know that there are some relatively simple actions you can take that will greatly increase your chances of fighting…

Would Your Organization Fail the Active Directory Security Assessment?

Would Your Organization Fail the Active Directory Security Assessment?

As cyberattacks proliferate, many organizations are investing resources in plugging holes in their security strategy. But one common attack entry point—also used in the SolarWinds breach—is consistently overlooked: Active Directory. According to results from a new security assessment tool that evaluates security weaknesses in Active Directory configurations, even large organizations…

New infosec products

Securing Active Directory—the Key Entry Point in Recent Cyberattacks

The health crisis of 2020 reshaped our view of how people work and how businesses run. As technology teams and processes have shifted to support remote workers and enable seamless supply-chain interactions, cybercriminals have seized opportunities to exploit the resulting gaps in security. As PWC recently reported, the number and…