Community Tools

AD Security 101: AD Monitoring for Malicious Changes

AD Security 101: AD Monitoring for Malicious Changes

  • Daniel Petri
  • Mar 09, 2023

Welcome to AD Security 101. This blog series covers essential aspects of Active Directory (AD) security, offering basic concepts, best practices, and expert advice. I’ll start with a short discussion of why AD security is so important. Then I’ll dive into the series with one of the first steps you…

3 Steps to Protect AD from Wiperware

3 Steps to Protect AD from Wiperware

  • Darren Mar-Elia
  • Feb 10, 2023

We’re barely a month into the new year, but wiperware is back in the news. DevPro Journal notes a “drastic increase” starting last year, likely driven by geopolitical conflict. What is wiperware—and how can you protect your organization? What is wiperware? Wiperware is often used as part of an advanced…

How Can K-12 Schools Defend Against Ransomware?

How Can K-12 Schools Defend Against Ransomware?

  • Jared Vichengrad
  • Feb 02, 2023

The cybersecurity challenges in the government and education space are nothing new. Such challenges soared with COVID and continue today. Unfortunately, the cyber defense of mission-critical government and education services has not always kept pace, so we still see risk from several common vulnerabilities—especially for K-12 education organizations. But with…

5 Essential ITDR Steps CISOs Must Know

5 Essential ITDR Steps CISOs Must Know

  • Semperis Team
  • Jan 26, 2023

Just as the impact of cyberattacks is not confined to the IT department, the role of the CISO has expanded beyond the security team. With organizations and analysts now acknowledging that identity is the new security perimeter, overseeing a comprehensive identity-first security strategy has become an essential CISO responsibility. What…

Closing Attack Paths to Tier 0 Assets with Forest Druid

Closing Attack Paths to Tier 0 Assets with Forest Druid

  • Ran Harel
  • Dec 08, 2022

After announcing Forest Druid, our free Tier 0 attack path discovery tool, at Black Hat 2022, we’ve used it to help some of the largest organizations in the world close off attack paths to Tier 0 Active Directory assets. Our work with these organizations has validated that defenders can save…

Operational Resilience: More than Disaster Recovery

Operational Resilience: More than Disaster Recovery

  • Sean Deuby
  • Dec 07, 2022

To contend with the explosion of cybercrime and its impact on business operations, many organizations are updating their disaster recovery plans to include cyber incident response. Many of the processes and guidelines in traditional disaster recovery plans have changed little in years, sometimes even in over a decade—making them ill-suited…

Construction Firm Strengthens its ITDR Foundation with Purple Knight

Construction Firm Strengthens its ITDR Foundation with Purple Knight

  • Semperis Team
  • Nov 16, 2022

Between remote users and contractors, construction company Maple Reinders needed to get control of Active Directory (AD) user account security and shore up its Identity Threat Detection and Response (ITDR) foundation—fast. Managing AD user account sprawl Award-winning full-service construction company Maple Reinders has operated in multiple provinces across Canada for…

Missouri School District Finds and Fixes Active Directory Security Gaps

Missouri School District Finds and Fixes Active Directory Security Gaps

  • Semperis Team
  • Oct 06, 2022

“As a K–12 environment, our Active Directory [AD] deployment is a bit unique compared to how a standard business network would look,” says John Hallenberger, systems administrator and project leader for the Fox C-6 school district. “Users are added and removed pretty much daily. Things like complex password enforcement and…