Directory Services Protector

NIS2 and Your Identity Infrastructure

NIS2 and Your Identity Infrastructure

Compliance with the EU’s NIS2 directive requires a focus on securing identity systems, which have become a key battleground for cyber defenders and attackers.

ECC-2 and Your Identity Infrastructure

ECC-2 and Your Identity Infrastructure

Saudi Arabia’s ECC-2 controls provide comprehensive, standards-driven cybersecurity practices for public and private organizations. Much of their guidance applies particularly to identity systems—the source of access and authentication across most critical business systems.

Five Eyes Alliance Identity Security Requirements: What Federal Agencies Need to Know

Five Eyes Alliance Identity Security Requirements: What Federal Agencies Need to Know

Cybersecurity agencies from the Five Eyes alliance, including the Cybersecurity Infrastructure and Security Agencies (CISA) and the National Security Agency (NSA), have urged organizations to strengthen security controls for Active Directory (AD), a prime target for cyber attackers. In “Detecting and Mitigating Active Directory Compromises,” the agencies highlighted more than…

Sound Advice from Consulting Firm RSM Ebner Stolz: Secure Identity Systems

Sound Advice from Consulting Firm RSM Ebner Stolz: Secure Identity Systems

  • May 29, 2025

Learn how RSM Ebner Stolz, one of the top auditing, tax, legal, and management consulting firms in Germany, prioritized ITDR for cyber security and operational resilience.

Maintaining Strong Security Posture at ADP

Maintaining Strong Security Posture at ADP

  • May 19, 2025

Recognizing that Active Directory is a prime attack target, the infrastructure team at ADP, global provider of cloud-based human capital management (HCM) solutions, looked for a solution that could help them continuously assess their legacy AD environment for misconfigurations.

Closing the Gap for Government Agencies: 5 Ways to Automate Cyber Resilience

Closing the Gap for Government Agencies: 5 Ways to Automate Cyber Resilience

  • Semperis
  • May 19, 2025

Operational continuity depends on cyber resilience. Maintaining that resilience can be tricky when resources are scarce. Attackers know this and are skilled at turning staffing turnover and technology gaps to their advantage. Attackers’ favorite means of spreading malware, escalating privilege, and establishing perseverance is the identity infrastructure—typically Microsoft Active Directory…

Improving Disaster Recovery Planning and Security Posture at Legal Firm Foulston Siefkin

Improving Disaster Recovery Planning and Security Posture at Legal Firm Foulston Siefkin

  • May 19, 2025

While working through the process of securing the hybrid environment, law firm Foulston Siefkin LLP reviewed its business continuity practices and looked for a solution that would help the firm meet its identity system recovery and security posture goals.

Meeting Healthcare Security and Compliance Objectives at Temple Health

Meeting Healthcare Security and Compliance Objectives at Temple Health

  • May 19, 2025

Temple Health, a Philadelphia-based academic health system, needed an identity threat detection and response (ITDR) system that would help them comply with the myriad healthcare industry regulations for protecting patient health information (PHI).

DORA and Your Identity Infrastructure

DORA and Your Identity Infrastructure

Understanding the implications of the Digital Operational Resilience Act (DORA) is crucial, both to meet regulatory demands and to safeguard your identity infrastructure. This white paper provides comprehensive insights into DORA's requirements and practical strategies to enhance your compliance—and your organization's resilience. What's inside: Emerging threat landscape: Explore the latest…

Why Is Your AD an Easy Target for Hackers?

Why Is Your AD an Easy Target for Hackers?

  • Semperis

Active Directory (AD) remains a cornerstone for many organizations, both on premises and integrated with Microsoft Entra ID in the cloud. Alarmingly, 90% of cyberattacks target AD, the central identity system for most enterprises. Semperis provides comprehensive protection for on-premises AD and Entra ID, offering continuous defense against identity-based threats before,…