We Can't Do Anything About The Weather, But… When bad things happen, we can dramatically speed your time to recovery! This seems to be a common concern, and one that is front and center with Board Members and Senior Management. What do we do if we've lost all access to…
You know Petya, and Sandworm, and Spyware, and Rootkits. Mimikatz and WannaCry, and backdoors and botnets.But do you recall....... the most damaging attack of all?....NotPetya the Russian Wiper, had a very nasty bite.And if you ever saw it, you would even say “Good Night!”.All of the other malware’s... used to…
Last month, I have had many discussions with many people on Active Directory Backup and Restore. Now, the obvious topics to talk about are disaster recovery and forest recovery. Of course, we talked about these, but in many of the discussions last month, we focused more on what I’d call…
Updated: Azure AD Password Protection became generally available April 2nd, 2019. The service is largely the same as I presented in this post, with the following updates: The two proxy limit has been lifted. When registering the proxy and the Active Directory forest, 3 authentication modes are now available. Two…
Ransomware attacks on enterprises are escalating both in frequency and complexity. Many in the security space believe that WannaCry and NotPetya were only a sample of what’s coming. Increasingly, Active Directory (AD) is at the center of cyberattacks, with wipers like MBR-ONI utilizing AD to maximize the attack reach and,…
Guest column by Joseph Carson, Chief Security Scientist at Thycotic. “Ransomware” is on the rise using “targeted phishing attacks” and is being used for financial blackmail and poison or corrupt data. No one is excluded from these threats and no company or individual is too small to be a target.…
Most IT departments have no issue admitting the high importance of a highly available Active Directory. It’s become clear that while Active Directory downtime is rare when it does happen, it’s devastatingly costly. Most modern enterprises live and die by their identity infrastructure, and Active Directory is primarily at the…
I addressed Active Directory excessive privilege in the past as part of other, broader topics. But recently I started thinking it’s a great time to dedicate an entire article to it. This is not a random thought on my part. All you need to do is look at a few…