Hybrid Identity Protection

Defending Hybrid Identity Environments Against Cyberattacks

Defending Hybrid Identity Environments Against Cyberattacks

  • Edward Amoroso
  • Feb 28, 2022

As the world continues to embrace digital transformation and distributed work, businesses will continue to deploy SaaS apps—while continuing to use on-premises tools. Hybrid ecosystems are becoming increasingly common as a result. Unfortunately, current identity and access management (IAM) practices simply aren’t up to the task of managing them. The…

6 Take-Aways from HIP Global Conference 2021

6 Take-Aways from HIP Global Conference 2021

  • Michele Crockett
  • Dec 08, 2021

The chat boxes were on fire and Twitter was buzzing during the recent Hybrid Identity Protection Conference 2021, where the identity and security community gathered to grapple with current-day challenges and prepare for the future of identity. The online conference held Dec. 1-2 drew a mix of identity and access…

Why 86% of Organizations Are Increasing Their Investment in Active Directory Security

Why 86% of Organizations Are Increasing Their Investment in Active Directory Security

  • Michele Crockett
  • Nov 10, 2021

New EMA Research Highlights the Rise of Active Directory Exploits Active Directory is getting a lot of buzz in business and tech news outlets lately—but not in a good way. AD continues to be a prime target for cybercriminals: Just a few recent examples include AD-related attacks on Sinclair Broadcast…

How to Defend Against Ransomware-as-a-Service Groups That Attack Active Directory

How to Defend Against Ransomware-as-a-Service Groups That Attack Active Directory

  • Semperis Team
  • May 17, 2021

Concern about the Colonial Pipeline ransomware attack by DarkSide has expanded beyond the cybersecurity industry and into the consciousness of the everyday consumer—an indicator of the extensive implications the attack has on the global economy. In response, the Biden administration issued an executive order and held a press conference, and…

Hafnium Attack Timeline

Hafnium Attack Timeline

  • Sean Deuby
  • May 05, 2021

The attacks on Microsoft Exchange servers around the world by Chinese state-sponsored threat group Hafnium are believed to have affected over 21,000 organizations. The impact of these attacks is growing as the four zero-day vulnerabilities are getting picked up by new threat actors. While the world was introduced to these…

How to Defend Against Active Directory Attacks That Leave No Trace

How to Defend Against Active Directory Attacks That Leave No Trace

  • Guido Grillenmeier
  • Apr 01, 2021

Cybercriminals are using new tactics and techniques to gain access to Active Directory in novel ways, making their attacks even more dangerous—and more necessary to detect.  One of the most important parts of any cybersecurity strategy is detection. Having an ability to spot the bad guy entering, moving about, or worse—administering—your network is…

Semperis Contributes to Two NIST Data Integrity Practice Guides

Semperis Contributes to Two NIST Data Integrity Practice Guides

  • Michele Crockett
  • Feb 12, 2021

NIST recommends complementary solutions, much like a team of security superheroes To succeed in protecting your company’s data against ransomware, you need to proceed as if you’re assembling a team of superheroes. Each team member has a singular power that individually appears limited. But together, they can conquer evil.  As the number of cyberattacks…

Hybrid Identity Protection (HIP) Predictions for 2021

Hybrid Identity Protection (HIP) Predictions for 2021

  • Thomas Leduc
  • Dec 23, 2020

2020 was a hugely disruptive year across the globe. And while cybersecurity may have been background noise to a world tuned to health and financial issues, widespread cyberattacks have left reverberations that will be felt for years to come.  We asked expert speakers from the recent Hybrid Identity Protection (HIP) Conference to share a brief look back at what happened in 2020 and what they're focusing on in the year ahead as…