General | October 21, 2020Sophisticated phishing Most of us can think of a time when we received a phishing email. In fact, most phishing...
ADSelfService Plus | May 17, 2019Two-factor authentication for secure access to cloud apps in hybrid AD In an earlier post, we dealt with the benefits of single sign-on (SSO) for cloud apps in...
Identity and access management | March 6, 2019Gain insights into user behavior and detect insider threats A whopping 60 percent of cyberattacks are caused by insiders. This could be due to...
Identity and access management | January 17, 2019Securing Hybrid Active Directory webinar series Active Directory (AD) administrators are heading into 2019 with security on their minds....
Identity and access management | December 20, 2018Minimizing membership in the local Administrators group on workstations If you have a long list of users with administrative rights, there's a good chance you've...
Identity and access management | December 19, 2018Monitoring users for unusual file activity As we discussed in a previous blog, the user behavior analytics (UBA) engine of ADAudit...
Identity and access management | December 6, 2018Leveraging logic and AI to detect malicious behavior in Active Directory [Webinar] Active Directory is still vital for every organization that's staying on-premises or...
Identity and access management | November 29, 2018Monitoring Active Directory and Windows computers to detect attacks [Webinar] If organizations and administrators can be alerted when they're under attack, then they...
Identity and access management | November 15, 2018User behavior analytics for streamlined threat detection Cyberthreats are on the rise and breaches are becoming more common. Many businesses rely...
Identity and access management | November 1, 2018Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2 In Part 1, we touched on how routine monitoring of object life cycle changes in the local...
General | October 25, 2018Application whitelisting using Software Restriction Policies Software Restriction Policies (SRPs) is a Group Policy-based feature in Active Directory ...
Identity and access management | October 11, 2018Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1 Imagine you're an admin in a company that prides itself on its security practices, which...