Identity Threat Detection & Response

Your Active Directory was compromised, is it all lost? – Part 2

Your Active Directory was compromised, is it all lost? – Part 2

  • David Lieberman
  • Mar 20, 2019

Hi, This is part two of a blog that I had written earlier.  The premise of part one was to better understand what are the options that companies face should their Active Directory be compromised. How can they get back up and running as quickly as possible? How can it…

We Can’t Do Anything About The Weather, But…

We Can’t Do Anything About The Weather, But…

  • Steve Mackay
  • Jan 29, 2019

We Can't Do Anything About The Weather, But… When bad things happen, we can dramatically speed your time to recovery! This seems to be a common concern, and one that is front and center with Board Members and Senior Management. What do we do if we've lost all access to…

NotPetya, the Russian Wiper

NotPetya, the Russian Wiper

  • Steve Mackay
  • Dec 19, 2018

You know Petya, and Sandworm, and Spyware, and Rootkits. Mimikatz and WannaCry, and backdoors and botnets.But do you recall....... the most damaging attack of all?....NotPetya the Russian Wiper, had a very nasty bite.And if you ever saw it, you would even say “Good Night!”.All of the other malware’s... used to…

Active Directory Change Resiliency

Active Directory Change Resiliency

  • Sander Berkouwer
  • Jul 18, 2018

Last month, I have had many discussions with many people on Active Directory Backup and Restore. Now, the obvious topics to talk about are disaster recovery and forest recovery. Of course, we talked about these, but in many of the discussions last month, we focused more on what I’d call…

WannaCry, NotPetya, MBR-ONI and Friends: Tales of Wiper Attacks and Active Directory Destruction

WannaCry, NotPetya, MBR-ONI and Friends: Tales of Wiper Attacks and Active Directory Destruction

  • Mickey Bresman
  • Apr 24, 2018

Ransomware attacks on enterprises are escalating both in frequency and complexity. Many in the security space believe that WannaCry and NotPetya were only a sample of what’s coming. Increasingly, Active Directory (AD) is at the center of cyberattacks, with wipers like MBR-ONI utilizing AD to maximize the attack reach and,…

Kerberos at the Company Party

Kerberos at the Company Party

  • Sean Deuby
  • Mar 12, 2018

Back in 1999, I wrote a book on Windows 2000 Server in general, and Active Directory in particular. I try not to look back at what I wrote about AD back then compared to what I know now, but I remain fond of a passage that explained how the Kerberos…

How Do I Protect Against Ransomware?

How Do I Protect Against Ransomware?

  • Joseph Carson
  • Oct 18, 2017

Guest column by Joseph Carson, Chief Security Scientist at Thycotic. “Ransomware” is on the rise using “targeted phishing attacks” and is being used for financial blackmail and poison or corrupt data. No one is excluded from these threats and no company or individual is too small to be a target.…

5 Information Security Policies Every CISO Must Enforce Now

5 Information Security Policies Every CISO Must Enforce Now

  • Joseph Carson
  • Sep 27, 2017

Guest column by Joseph Carson, Chief Security Scientist at Thycotic. Chief Information Security Officers, CISOs, bear some of the heftiest weights on their shoulders of anyone in an organization. Single-handedly, depending on their security policies and the enforcement of them, they can be responsible for the success or downfall of…