Active Directory Backup & Recovery

Attacking Active Directory: Why Cyber Threats Target AD

Attacking Active Directory: Why Cyber Threats Target AD

  • Darren Mar-Elia
  • Feb 21, 2024

[Updated February 21, 2024; originally published December 14, 2017] Active Directory is the most critical identity system for most enterprises. The problem is that in the two-plus decades since Active Directory was released, the enterprise security landscape has changed drastically. Yet few businesses have adapted their Active Directory environments to…

A Swift Ransomware Response is the Path to Business Resiliency

A Swift Ransomware Response is the Path to Business Resiliency

  • Mickey Bresman
  • Dec 22, 2023

Cyberattacks on business systems—including hybrid identity systems—continue to make headlines, including recent breaches targeting healthcare company Henry Schein and hospitality conglomerate MGM Resorts. Apart from these well-publicized attacks, the Semperis Breach Preparedness & Response Services team has seen a spike in requests from our customers (and our partners’ customers) to…

How Can K-12 Schools Defend Against Ransomware?

How Can K-12 Schools Defend Against Ransomware?

  • Jared Vichengrad
  • Feb 02, 2023

The cybersecurity challenges in the government and education space are nothing new. Such challenges soared with COVID and continue today. Unfortunately, the cyber defense of mission-critical government and education services has not always kept pace, so we still see risk from several common vulnerabilities—especially for K-12 education organizations. But with…

5 Essential ITDR Steps CISOs Must Know

5 Essential ITDR Steps CISOs Must Know

  • Semperis Team
  • Jan 26, 2023

Just as the impact of cyberattacks is not confined to the IT department, the role of the CISO has expanded beyond the security team. With organizations and analysts now acknowledging that identity is the new security perimeter, overseeing a comprehensive identity-first security strategy has become an essential CISO responsibility. What…

How to Build a Strong ITDR Strategy

How to Build a Strong ITDR Strategy

  • Sean Deuby
  • Jan 17, 2023

How do you begin to build a strong Identity Threat Detection and Response (ITDR) strategy? It begins with an understanding of your unique identity environment, says Maarten Goet, Director for Cybersecurity at Wortell and an expert in Microsoft technologies and communities. “The top identity security concern is [organizations] typically don’t…

Why Recovering Active Directory from a Cyberattack Is an Essential Component of ITDR

Why Recovering Active Directory from a Cyberattack Is an Essential Component of ITDR

  • Guido Grillenmeier
  • Dec 13, 2022

A plan for recovering Active Directory (AD) should be a priority for your identity threat detection and response (ITDR) plan. After all, we live in a federated world of hybrid identities, zero-touch login, and distributed work. In this digital landscape, everything is connected. For most organizations, AD is at the…

Operational Resilience: More than Disaster Recovery

Operational Resilience: More than Disaster Recovery

  • Sean Deuby
  • Dec 07, 2022

To contend with the explosion of cybercrime and its impact on business operations, many organizations are updating their disaster recovery plans to include cyber incident response. Many of the processes and guidelines in traditional disaster recovery plans have changed little in years, sometimes even in over a decade—making them ill-suited…

Identity Threat Response with Brian Desmond

Identity Threat Response with Brian Desmond

  • Sean Deuby
  • Nov 04, 2022

Identity threat response—the initial aspect of ITDR—is gaining importance as cyberattackers continue to find new ways into victims’ environments. I recently spoke with Brian Desmond, Principal at Ravenswood Technology Group, about his experience helping organizations secure identity and protect and recover critical identity assets like Active Directory (AD). “Anything that…