Cyberattacks against state and local government agencies, as well as critical public infrastructure, have soared over the past few years. Is your cybersecurity strategy ready for today’s attackers? From finding ways past MFA to hiding from SIEM solutions and security logs, threat actors have become adept at bypassing endpoint and…
A secure identity system is the foundation of your Zero Trust architecture. That’s why attackers regularly target Microsoft Active Directory (AD) and Entra ID. Gaining control of these identity systems can give threat actors near-total control of all your systems, access to sensitive data, and the means to devastate your…
Cyberattacks are the most critical threat facing modern information technology. Most attacks start with identity compromise. For the past quarter century, identity in the enterprise has been synonymous with Microsoft Active Directory (AD). Therefore, AD is almost always involved in a cyberattack—either as the target or as a route to…
What do you do when your endpoint or other initial protections are breached? When intruders are already in your network and have even compromised your Active Directory (AD) forest? This is the true story of a ransomware attack—and how it was stopped. Join Semperis’ Principal Technologist and MVP alumnus Guido…
Cyberattackers have healthcare systems in their sights. By breaching identity systems such as Active Directory and Entra ID, attackers can quickly compromise vital operational infrastructure and sensitive data throughout a healthcare organization. Securing the identity infrastructure is a key step in thwarting threat actors. Join Marty Momdjian, Semperis’ EVP of…
“I just don’t have the time to deal with Active Directory.” How many times have you heard (or said) that? Cleaning up years of AD configuration drift and tech debt can be a daunting task … but not as unpleasant as trying to recover the identity system after a full-blown…
Die Maxime "die IT von morgen ist hybrid" ist gängiger Standard in der IT-Beratung und bei Cloud-Anbietern. Auch Microsofts neue Sicherheits-Referenzarchitektur ist hybrid, betrachtet die Cloud als "Source of Security". Doch die Schattenseiten zeigen sich deutlich, wenn die hybride Identität kompromittiert wird. Dies bringt Herausforderungen wie Störungen beim Single Sign-On,…
In this on-demand webinar, Rob Ingenthron, Senior Solution Architect at Semperis, will delve into the significance of AD protection and recovery in identity threat detection and response (ITDR). Attendees can expect to: Discover effective strategies for integrating AD protection and recovery into a comprehensive ITDR approach. Gain a deeper understanding…
Explore the vital role of identity in disaster recovery planning, specifically focusing on Microsoft Active Directory. This on-demand webinar addresses the challenges in recovering core directory services and emphasizes the need for proactive planning. Key takeaways include reevaluating DR procedures, engaging with ITDR vendors, and enhancing identity security. The webinar…
Active Directory (AD) ist und bleibt eine Kernanwendung, egal ob on-premise oder als Azure AD in der Cloud. In dem Web-Seminar der Semperis, Inc. beleuchtet AD-Experte Guido Grillenmeier Risiken sowie Möglichkeiten, AD zu schützen. Seit mehr als zwei Jahrzehnten ist Microsoft Active Directory (AD) die De-facto-Methode, die Unternehmen zur Authentifizierung…