Microsoft is deprecating RC4 encryption beginning in April 2026. This post explains the process—and points you to resources that can help.
Learn about the discovery of CVE-2026-26119: why it worked and why you shouldn't underestimate authentication reflection.
Is use of the Windows Remote Management (WinRM) protocol over HTTP inherently bad? Take a nuanced look at why "HTTP = insecure" isn't the whole story—and when HTTPS can actually introduce risk.
One of the most common misconfigurations I encounter in Active Directory environments is a LAN Manager authentication level set to 2 on domain controllers (DCs). If your reason for staying at level 2 is legacy application compatibility, you can move to level 3 today without breaking those applications.
Almost every AD security assessment, penetration test, or architecture conversation ends up containing the recommendation to “switch from unsecured LDAP to LDAPS” for your Active Directory (AD). Working for a software vendor whose products “do stuff with AD,” I hear the question multiple times a week: “Does your product XY…
Active Directory is attackers’ favorite path to domain dominance. Learn how mapping your defenses to the NIST Cybersecurity Framework can improve cyber incident response and recovery.
Attackers with certain privileges can abuse Entra Connect hard matching synchronization to take over synchronized Entra ID accounts.
For anyone safeguarding hybrid identity systems, continuous learning and cyber community engagement are critical. Here are our top picks for conferences that deliver a laser-focus on identity security—and the technical knowledge you need to stay ahead of threats.