Identity Threat Detection & Response

Kerberos at the Company Party

Kerberos at the Company Party

  • Sean Deuby | Principal Technologist, North America

Back in 1999, I wrote a book on Windows 2000 Server in general, and Active Directory in particular. I try not to look back at what I wrote about AD back then compared to what I know now, but I remain fond of a passage that explained how the Kerberos…

How Do I Protect Against Ransomware?

How Do I Protect Against Ransomware?

  • Joseph Carson

Guest column by Joseph Carson, Chief Security Scientist at Thycotic. “Ransomware” is on the rise using “targeted phishing attacks” and is being used for financial blackmail and poison or corrupt data. No one is excluded from these threats and no company or individual is too small to be a target.…

5 Information Security Policies Every CISO Must Enforce Now

5 Information Security Policies Every CISO Must Enforce Now

  • Joseph Carson

Guest column by Joseph Carson, Chief Security Scientist at Thycotic. Chief Information Security Officers, CISOs, bear some of the heftiest weights on their shoulders of anyone in an organization. Single-handedly, depending on their security policies and the enforcement of them, they can be responsible for the success or downfall of…

Two New Microsoft Hybrid Services Dramatically Simplify Connecting your Active Directory to Azure

Two New Microsoft Hybrid Services Dramatically Simplify Connecting your Active Directory to Azure

  • Sean Deuby | Principal Technologist, North America

Microsoft recently announced the public preview of two major new capabilities that will make integrating your on-premises Active Directory to Azure AD much, much easier. Passthrough authentication (PTA) and Seamless Single Sign-On (I'm choosing to call it 3SO) will allow your users to easily access Azure AD applications such as…

NIST joins Microsoft in Changing How We Should Think About Passwords

NIST joins Microsoft in Changing How We Should Think About Passwords

  • Sean Deuby | Principal Technologist, North America

On the heels of Microsoft's updated password recommendations, the National Institute for Standards and Technology (NIST) has come out with its own updated password guidelines. These recommendations parallel many of Microsoft's recommendations and thus give them extra credibility; in some areas they go further. When two major security industry influencers…

Understanding Azure AD Password (Hash) Sync

Understanding Azure AD Password (Hash) Sync

  • Sean Deuby | Principal Technologist, North America

Now that businesses are adopting cloud computing as part of their business model, a large percentage are choosing to connect their on-premises Active Directory environment to its counterpart in the cloud, Microsoft's Azure Active Directory. When you extend your on-premises AD to Azure AD, you have two choices for how…

Active Directory Corruption Comes In Two Flavors

Active Directory Corruption Comes In Two Flavors

  • Sean Deuby | Principal Technologist, North America

Active Directory is a very robust application, as it should be for such a fundamental building block of a company's IT infrastructure. But the architecture that makes it robust also makes it hard to understand.  This lack of understanding often leads to assumptions in your recovery strategy that can leave…

When you should use Azure MFA and when you should use MFA Server

When you should use Azure MFA and when you should use MFA Server

  • Sean Deuby | Principal Technologist, North America

One of the most common security-related trends I'm seeing with customers is an interest in adding multifactor authentication (MFA) to both their new and existing solutions. This trend is usually driven by a need to increase overall security, or to satisfy regulatory requirements. As a hybrid service, Azure MFA MFA…