Préparez-vous à l’impensable: Quand l’Active Directory est à l’arrêt après une Cyberattaque, chaque minute compte!

Préparez-vous à l’impensable: Quand l’Active Directory est à l’arrêt après une Cyberattaque, chaque minute compte!

Après une compromission, comment limiter le temps d’indisponibilité de l’AD, pour redémarrer les activités au plus vite ?

How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches

How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches

Active Directory exploitation is the common thread in recent high-profile attacks. Colonial Pipeline, SolarWinds, Hafnium – every day we hear about a new attack, a new vulnerability, and devastating consequences. Almost every attack is centered on finding a foothold in Active Directory, escalating privileges, and wreaking havoc. The exposure is…

De Quand Date le Dernier Audit de Sécurité de votre Active Directory?

De Quand Date le Dernier Audit de Sécurité de votre Active Directory?

AD est une cible préférée des attaquants. C’est pourquoi, un audit régulier est nécessaire pour identifier et corriger les vulnérabilités avant que les pirates ne le fassent.

What You Need to Know About Securing Active Directory

What You Need to Know About Securing Active Directory

For more than two decades, Microsoft Active Directory (AD) has been the de facto method organizations use to authenticate and authorize users so they can access computers, devices, and applications within a network. AD is celebrated for its ease of management. But that ease of use comes with security downsides.…

Semperis and Fishtech Present: Ransomware, Risk, and Recovery

Semperis and Fishtech Present: Ransomware, Risk, and Recovery

Is Your Core Identity System Ready for Today's Threats? Active Directory is used for identity management by 90% of businesses. But this 20-year-old technology is increasingly under attack by cyber-criminals who use AD to gain access to your network — and your data. Recent incidents like the Hafnium attack on…

Semperis and Dell Present: Ransomware, Risk, and Recovery

Semperis and Dell Present: Ransomware, Risk, and Recovery

Disaster Recovery (DR) strategies have traditionally focused on natural disasters, then expanded into other physical events such as terrorism. Today, cyber weaponization is everywhere, and the "extinction event" is a genuine threat with no respect for geographic boundaries. Presented by 15-time Microsoft MVP and identity security expert Sean Deuby (Semperis…

The Changing Role of Active Directory Engineers in a Cyber-Resilient Organization

The Changing Role of Active Directory Engineers in a Cyber-Resilient Organization

As cyber-attacks increasingly target Active Directory as an initial entry point, the role of AD engineers and architects is rapidly expanding to include security responsibilities. At the same time that AD engineers must secure access to cloud applications, they must also guard against attackers that take advantage of AD configuration…

Retour sur les cyberattaques récentes, l’Active Directory au centre de toutes les attentions

Retour sur les cyberattaques récentes, l’Active Directory au centre de toutes les attentions

Nous présentons un récapitulatif des cyberattaques en France ainsi que des pistes d'améliorations de la sécurité de votre Active Directory avant, pendant et après une cyberattaque.

A CISO Debate: What’s the Achilles Heel of Security in 2021?

A CISO Debate: What’s the Achilles Heel of Security in 2021?

The adoption of cloud-based applications and remote workforces is rapidly changing the threat landscape, and security leaders have been preparing. But no one could have predicted a global pandemic to dramatically accelerate digital transformation and force businesses to adapt literally overnight. In this time of exceptional turbulence, it's even more…

Top 5 Pitfalls to Avoid with Bare-Metal Recovery for Active Directory

Top 5 Pitfalls to Avoid with Bare-Metal Recovery for Active Directory

Disaster recovery programs appreciate bare-metal recovery (BMR) for its promise of fast and convenient full system restores. Gone are the days of re-building servers from scratch. Now, entire servers, complete with operating system, applications, settings, and drivers, are restored with a few clicks. Of course, life is never that simple.…