Category: Disaster Recovery

Insights From Thought Leaders Around The Globe

The digital identities of modern enterprises exist in a dynamic environment. Read thought leadership from experts worldwide regarding the constantly changing global IT environment and insights for keeping up with growing demands, and securing against escalating threats and vulnerabilities.

Azure Active Directory Administrative Units

Azure Active Directory Administrative Units: Azure AD Delegation of Administrative Permissions The move to the cloud often means that we need to learn new ways to manage access to cloud based resources. The methods of delegating administrative control we are accustomed to on-premises are often no longer applicable to cloud-based resources. Office 365 has long … Read More

The Cloud Identity Dilemma

I feel the dilemma ‘Between a rock and a hard place’ applies to many medium-sized businesses when it comes to cloud identity in the face of Microsoft retargeting their identity investment towards the cloud. These organizations may be too big to fully benefit from Identity Management-as-a-Service, but too small to really afford the impact an … Read More

WannaCry, NotPetya, MBR-ONI and Friends: Tales of Wiper Attacks and Active Directory Destruction

Ransomware attacks on enterprises are escalating both in frequency and complexity. Many in the security space believe that WannaCry and NotPetya were only a sample of what’s coming. Increasingly, Active Directory (AD) is at the center of cyberattacks, with wipers like MBR-ONI utilizing AD to maximize the attack reach and, in some cases, wipers like … Read More

Attacking Active Directory: Tools and Techniques for Using your AD Against You

The Problem with Active Directory Since it was introduced in 2000, Active Directory has become the most critical application for the majority of enterprises. The problem is, that in the almost two decades since it was released, the enterprise security landscape has changed drastically and businesses have not adapted their Active Directory environment to meet … Read More

5 Security Policies Every CISO Must Enforce Now

Guest column by Joseph Carson, Chief Security Scientist at Thycotic. Chief Information Security Officers, CISOs, bear some of the heftiest weights on their shoulders of anyone in an organization. Single-handedly, depending on their security policies and the enforcement of them, they can be responsible for the success or downfall of an entire company. It is, … Read More

Top 6 Considerations for Choosing an Active Directory Disaster Recovery Solution

Most IT departments have no issue admitting the high importance of a highly available Active Directory. It’s become clear that while Active Directory downtime is rare, when it does happen, it’s devastatingly costly. Most modern enterprises live and die by their identity infrastructure, and Active Directory is primarily at the core of that infrastructure. And … Read More

The Top 5 Things to Know About the Latest Cyber Attacks

The latest rash of cyber attacks has both IT experts and C-level executives wanting to, well, cry. Malware, such as WannaCry and Petya/NotPetya, has been taking enterprises hostage across the globe, encrypting files and holding them ransom in exchange for money. The result? Network outages, debilitated health care institutions, delayed invoicing and shipments, and millions … Read More