Cybersecurity 2020: The Danger of Ransomware

Top Tips for Minimizing Your Identity Attack Surface

Is your cybersecurity strategy ready for today’s attackers? From finding ways past MFA to hiding from SIEM solutions and security logs, threat actors have become adept at bypassing endpoint and traditional defenses. A layered approach to identity threat detection and response (ITDR) can help you defend your hybrid Active Directory…

AD è diventato l’entry point dei recenti cyberattacks

AD è diventato l’entry point dei recenti cyberattacks

Capiremo come aumentare la nostra postura di sicurezza prima, durante e dopo un attacco.

Strengthen Operational Resilience with Identity Threat Detection and Response (ITDR)

Strengthen Operational Resilience with Identity Threat Detection and Response (ITDR)

Operational resilience today depends on your ability to prevent and quickly recover from the disruptions caused by cyberattacks. For most organizations, identity-first security is the key to such resilience. As Gartner notes, “misused credentials are now the top technique used in breaches…. attackers are targeting Active Directory and the identity…

A Look Back at Last Year – Cyberattacks and Why Active Directory is Central

A Look Back at Last Year – Cyberattacks and Why Active Directory is Central

Cybercrime does in fact pay, but don’t let it cost you. This webinar will look back at the last year of cyber-attacks in the UK and discuss the costs from both a business and monetary perspective - Lose Active Directory, Lose Your Business! Presented by David Hitchen - Semperis Sr…

Recovering AD: The missing piece in your ITDR plan

Recovering AD: The missing piece in your ITDR plan

Identity has become the new security perimeter. With 9 out of 10 cyberattacks involving Active Directory (AD), identity threat detection and response (ITDR) is now a priority for organizations that prize operational resilience. But unless your ITDR strategy includes an AD-specific recovery plan, you aren’t getting the full benefits of…

How to Respond to and Recover from a Cyberattack

How to Respond to and Recover from a Cyberattack

Attacks are inevitable and breaches are probable, particularly where your Active Directory is concerned. What is the correct path to take if you have been attacked? Join breach prevention and incident response experts from Semperis for best practices to ensure you recover quickly, completely, and in a more secure state…

Protect Your Identity Assets with Purple Knight and Forest Druid

Protect Your Identity Assets with Purple Knight and Forest Druid

Identity Threat Detection and Response (ITDR) is one of the most talked-about security trends this year. Why? Because your identity systems—Active Directory (AD) and Azure AD for most organizations—are a Tier 0 asset that hold the keys to all your IT and business operations. That makes AD a juicy target…

Closing Tier 0 Active Directory Attack Paths with Forest Druid

Closing Tier 0 Active Directory Attack Paths with Forest Druid

Active Directory has countless paths adversaries can take to achieve domain dominance. The problem is clear—excessive permissions. But sifting through every group and user relationship is impossible. Forest Druid flips the script, taking an inside-out approach to attack path management. Forest Druid focuses on attack paths leading into the Tier…

Ransomware, Risk, and Recovery: is your Core Identity System Secure?

Ransomware, Risk, and Recovery: is your Core Identity System Secure?

Active Directory is the heart of many organizations' information systems: It's used for identity management by 90 percent of businesses. But this 20-year-old technology is increasingly under attack by cyber-criminals who use AD to gain access to your network--and your data. Recent incidents like the Hafnium attack on Microsoft Exchange…

Think Like a Hacker: Defend Your Organization Against Ransomware-as-a-Service Attacks

Think Like a Hacker: Defend Your Organization Against Ransomware-as-a-Service Attacks

Government agencies are increasingly adopting software-as-a-service (SaaS) and other as-a-service models to modernize service delivery and increase efficiency. Cybercriminals are too. With ransomware-as-a-service (RaaS) tools, bad actors can use already-developed ransomware methods to execute attacks that are smarter, faster and more sophisticated. As concerns about ransomware attacks have grown tremendously…