Community Tools

Purple Knight Scoring Improves Understanding of Identity System Security Vulnerabilities

Purple Knight Scoring Improves Understanding of Identity System Security Vulnerabilities

  • Ran Harel
  • Dec 13, 2023

Our latest Purple Knight (PK) v4.2 release introduces fundamental changes, particularly concerning the new scoring calculation. Changing from a broader approach that considered all indicators, we've now zeroed in on the "failed" indicators, those that highlight genuine security threats in your environment. This shift aims to ensure that the overall…

Semperis Offers New Protection Against Okta Breaches

Semperis Offers New Protection Against Okta Breaches

  • Semperis Research Team
  • Aug 30, 2023

In an ever-evolving digital landscape, organizations rely on robust identity protection solutions to safeguard sensitive data and maintain secure operations. For most enterprise businesses, that means protecting Active Directory and Entra ID (formerly Azure AD). But identity protection is just as vital for organizations that use Okta, a cloud-based identity…

AD Monitoring: AD Security 101

AD Monitoring: AD Security 101

  • Daniel Petri
  • Mar 09, 2023

An unmanaged Active Directory (AD) can have a profound impact on your operations, leading to downtime and increasing your vulnerability to network security threats. AD monitoring can provide insights you need to ensure smooth operations, optimize performance, and safeguard your network. Welcome to AD Security 101. This blog series covers…

3 Steps to Protect AD from Wiperware

3 Steps to Protect AD from Wiperware

  • Darren Mar-Elia
  • Feb 10, 2023

We’re barely a month into the new year, but wiperware is back in the news. DevPro Journal notes a “drastic increase” starting last year, likely driven by geopolitical conflict. What is wiperware—and how can you protect your organization? What is wiperware? Wiperware is often used as part of an advanced…

How Can K-12 Schools Defend Against Ransomware?

How Can K-12 Schools Defend Against Ransomware?

  • Jared Vichengrad
  • Feb 02, 2023

The cybersecurity challenges in the government and education space are nothing new. Such challenges soared with COVID and continue today. Unfortunately, the cyber defense of mission-critical government and education services has not always kept pace, so we still see risk from several common vulnerabilities—especially for K-12 education organizations. But with…

5 Essential ITDR Steps CISOs Must Know

5 Essential ITDR Steps CISOs Must Know

  • Semperis Team
  • Jan 26, 2023

Just as the impact of cyberattacks is not confined to the IT department, the role of the CISO has expanded beyond the security team. With organizations and analysts now acknowledging that identity is the new security perimeter, overseeing a comprehensive identity-first security strategy has become an essential CISO responsibility. What…

Closing Attack Paths to Tier 0 Assets with Forest Druid

Closing Attack Paths to Tier 0 Assets with Forest Druid

  • Ran Harel
  • Dec 08, 2022

After announcing Forest Druid, our free Tier 0 attack path discovery tool, at Black Hat 2022, we’ve used it to help some of the largest organizations in the world close off attack paths to Tier 0 Active Directory assets. Our work with these organizations has validated that defenders can save…

Operational Resilience: More than Disaster Recovery

Operational Resilience: More than Disaster Recovery

  • Sean Deuby
  • Dec 07, 2022

To contend with the explosion of cybercrime and its impact on business operations, many organizations are updating their disaster recovery plans to include cyber incident response. Many of the processes and guidelines in traditional disaster recovery plans have changed little in years, sometimes even in over a decade—making them ill-suited…