Identity Threat Detection & Response

Identity Attack Watch: July 2022

Identity Attack Watch: July 2022

  • Semperis Research Team

Cyberattacks targeting Active Directory are on the upswing, putting pressure on AD, identity, and security teams to monitor the constantly shifting AD-focused threat landscape. To help IT pros better understand and guard against attacks involving AD, the Semperis Research Team offers this monthly roundup of recent cyberattacks that used AD…

Hybrid Identity Protection with Dr. Nestori Synnimaa

Hybrid Identity Protection with Dr. Nestori Synnimaa

  • Sean Deuby | Principal Technologist

“Every component in your on-prem environment that is part of a hybrid [Active Directory] configuration needs to be treated as a Tier 0 server, so they need to be protected as well as your domain controllers,” explains Dr. Nestori Synnimaa, AADInternals creator and Sr Principal Security Researcher at Secureworks Counter…

How Cybersecurity Is Evolving from EDR to XDR to ITDR

How Cybersecurity Is Evolving from EDR to XDR to ITDR

  • Sean Deuby | Principal Technologist

As businesses embrace hybrid work and digitization, endpoint, and identity are moving perpetually closer. Both professions are evolving, and to make the most of this evolution, people on both sides will need to cross the aisle. In a recent episode of the Hybrid Identity Protection podcast, I discuss this evolution…

Purple Knight Introduces Entra ID (formerly Azure AD) Security Indicators

Purple Knight Introduces Entra ID (formerly Azure AD) Security Indicators

  • Tammy Mindel

Purple Knight, the free Active Directory (AD) security assessment tool downloaded by 10,000-plus users, now enables you to identify and address security gaps across your hybrid identity environment. That's right: The latest release of Purple Knight introduces Entra ID security indicators. The ability to address security gaps across both on-prem…

A Diamond Ticket in the Ruff

A Diamond Ticket in the Ruff

  • Charlie Clark

[Editor’s note: This blog was co-authored by Andrew Schwartz at TrustedSec.] One day, while browsing YouTube, we came across a Black Hat 2015 presentation by Tal Be’ery and Michael Cherny. In their talk and subsequent brief, Watching the Watchdog: Protecting Kerberos Authentication with Network Monitoring, Be’ery and Cherny outlined something…

Identity Attack Watch: June 2022

Identity Attack Watch: June 2022

  • Semperis Research Team

Cyberattacks targeting Active Directory are on the upswing, putting pressure on AD, identity, and security teams to monitor the constantly shifting AD-focused threat landscape. To help IT pros better understand and guard against attacks involving AD, the Semperis Research Team offers this monthly roundup of recent cyberattacks that used AD…

Top Tips for Protecting Active Directory

Top Tips for Protecting Active Directory

  • Darren Mar-Elia | VP of Products

Active Directory is one of the most important components of your network. Yet protecting Active Directory can be one of the most challenging tasks on your to-do list. The problem is that AD changes so often and on such a large scale that it’s effectively immune to ordinary change management.…

Achieving Operational Resilience with Simon Hodgkinson

Achieving Operational Resilience with Simon Hodgkinson

  • Sean Deuby | Principal Technologist

Does your cybersecurity plan take your organization's goals for operational resilience into account? In a recent episode of the Hybrid Identity Podcast (HIP), I spoke with Semperis strategic advisor, former bp CISO, and HIP London panel speaker Simon Hodgkinson. Simon is an expert in operational resilience and how it relates…