General | November 25, 2022Great Power(Shell) doesn't always come with great responsibility: Sometimes, SIEM is all you need Fileless threats are on the rise. These threats occur when cybercriminals use pre...
Identity and access management | July 16, 2020The LLMNR/NBT-NS strike Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are two...
General | November 15, 2019Five worthy reads: Insider threats—what's in the cards for 2020? Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Identity and access management | March 6, 2019Gain insights into user behavior and detect insider threats A whopping 60 percent of cyberattacks are caused by insiders. This could be due to...
Identity and access management | December 20, 2018Minimizing membership in the local Administrators group on workstations If you have a long list of users with administrative rights, there's a good chance you've...
Identity and access management | December 19, 2018Monitoring users for unusual file activity As we discussed in a previous blog, the user behavior analytics (UBA) engine of ADAudit...
Identity and access management | December 6, 2018Leveraging logic and AI to detect malicious behavior in Active Directory [Webinar] Active Directory is still vital for every organization that's staying on-premises or...
Identity and access management | November 29, 2018Monitoring Active Directory and Windows computers to detect attacks [Webinar] If organizations and administrators can be alerted when they're under attack, then they...
Identity and access management | June 14, 2018Free webinar: Tracking Active Directory attacks and user logons Microsoft Active Directory is the center of most enterprises' network identity management....
Identity and access management | May 31, 2018Why password complexity is so important for your organization Passwords are a big part of your Active Directory (AD) environment. As an administrator,...
Identity and access management | April 6, 2018Webinar: Negating insider threats Organizations need to be keenly aware of the actions their employees take, especially...
Identity and access management | March 29, 2018Overcoming the shortcomings of native password policy controls in Active Directory With the constant threat of hackers trying to get their hands on your sensitive...