Identity Threat Detection & Response

Rethinking Cyber Crisis Management: Why Plans Fail — and What to Build Instead

Rethinking Cyber Crisis Management: Why Plans Fail — and What to Build Instead

  • Courtney Guss | Director of Crisis Management
  • Mar 25, 2026

Most organizations believe they are prepared for cyber crisis management because they have incident response plans, playbooks, and tabletop exercises. But these artifacts often fail when faced with real-world complexity. Here’s what to build instead.

What You Need to Know: Windows Admin Center Remote Privilege Escalation (CVE-2026-26119)

What You Need to Know: Windows Admin Center Remote Privilege Escalation (CVE-2026-26119)

  • Andrea Pierini
  • Mar 23, 2026

Learn about the discovery of CVE-2026-26119: why it worked and why you shouldn't underestimate authentication reflection.

Hardening Entra ID Recovery and Identity Security Resilience

Hardening Entra ID Recovery and Identity Security Resilience

  • Tim Springston
  • Feb 24, 2026

Most identity recovery strategies primarily focus on users and groups. But in Entra ID, that’s only part of the story. After an attack, if access signals are missing or misaligned, you may technically have your users back, but you still can’t safely run the business. Take a look at how…

Semperis Acquires MightyID: Expands True Cyber Resilience Across Multi-IdP Environments

Semperis Acquires MightyID: Expands True Cyber Resilience Across Multi-IdP Environments

  • Alex Weinert | Chief Product Officer
  • Feb 04, 2026

An identity an outage anywhere can become a business crisis everywhere. And effective defense means resilience—not just prevention—so operations can continue, even under attack. Learn how Semperis’ acquisition of MightyID expands our comprehensive identity resilience across your entire identity fabric.

25 Years of AD Breaches: Three Moves to Transform Incident Response

25 Years of AD Breaches: Three Moves to Transform Incident Response

  • Semperis
  • Jan 23, 2026

Active Directory is attackers’ favorite path to domain dominance. Learn how mapping your defenses to the NIST Cybersecurity Framework can improve cyber incident response and recovery.

SyncJacking: Hard Matching Vulnerability Enables Entra ID Account Takeover

SyncJacking: Hard Matching Vulnerability Enables Entra ID Account Takeover

  • Tomer Nahum
  • Jan 13, 2026

Attackers with certain privileges can abuse Entra Connect hard matching synchronization to take over synchronized Entra ID accounts.

Best Cybersecurity Conferences for Identity Security Professionals in 2026

Best Cybersecurity Conferences for Identity Security Professionals in 2026

  • Semperis
  • Dec 30, 2025

For anyone safeguarding hybrid identity systems, continuous learning and cyber community engagement are critical. Here are our top picks for conferences that deliver a laser-focus on identity security—and the technical knowledge you need to stay ahead of threats.

Ransomware Defense in 2026: What CISOs Need to Know

Ransomware Defense in 2026: What CISOs Need to Know

  • Sean Deuby | Principal Technologist, Americas
  • Dec 23, 2025

The fastest way to turn a cyber incident into a business outage is through identity system compromise. Ransomware continues to exploit that fact—and the consequences are real. Here are practical, board-ready steps CISOs can take to boost resilience when those attacks happen.