Vulnerabilities in Active Directory: The CISO’s Achilles Heel

Understanding how compromises occur is a fundamental part of forming a cybersecurity defense. With that in mind, I recently joined Andy Robbins, co-creator of the open source attack path discovery tool, BloodHound, for a webinar that outlined how attackers target Active Directory (AD).    During the presentation, we spotlighted an uncomfortable truth: the center of enterprise identity services is now a ripe, juicy …