What are organizations looking for in Identity Threat Detection and Response (ITDR) solutions? Organizations are looking for ITDR solutions that span the entire attack lifecycle—before, during, and after an attack—and offer protection specifically for AD and Azure AD. Darren Mar-Elia, Semperis VP of Products, summarizes feedback gathered at the 2022…
Active Directory has countless paths adversaries can take to achieve domain dominance. The problem is clear—excessive permissions. But sifting through every group and user relationship is impossible. Forest Druid flips the script, taking an inside-out approach to attack path management. Forest Druid focuses on attack paths leading into the Tier…
Active Directory is the heart of many organizations' information systems: It's used for identity management by 90 percent of businesses. But this 20-year-old technology is increasingly under attack by cyber-criminals who use AD to gain access to your network--and your data. Recent incidents like the Hafnium attack on Microsoft Exchange…
Real Field Story, Micah Clark, Information Technology Director, Central Utah 911 As a public safety 911 dispatch center, a high-stress job, it's normal to lose and hire people regularly, so Active Directory is constantly changing. There are a lot of things happening, including different computers being added or taken off…
Government agencies are increasingly adopting software-as-a-service (SaaS) and other as-a-service models to modernize service delivery and increase efficiency. Cybercriminals are too. With ransomware-as-a-service (RaaS) tools, bad actors can use already-developed ransomware methods to execute attacks that are smarter, faster and more sophisticated. As concerns about ransomware attacks have grown tremendously…
Most Fortune 1000 companies use Active Directory or Azure AD—and AD is involved in ~90% of cyberattacks. Did you know that there are some relatively simple actions you can take that will significantly increase your chances of fighting off attackers and building your resilience? How can you protect your organization?…
Live panel discussion with Ed Amoroso (TAG Cyber), Anthony Dagostino (Converge), and Jim Doggett (Semperis) With the rise of ransomware and cybercrime, having an effective cyber insurance policy in place is part of a layered defense strategy. But the cyber insurance industry is in a state of flux as the…
Jorge has been a Microsoft MVP since 2006 with a specific focus on designing, implementing, and securing Microsoft Identity & Access Management (IAM) technologies. Holding various Microsoft certifications, his experience includes Active Directory (AD) design and implementation, training, presenting, developing security-related scripts and tools, and developing and implementing AD and…
What do hackers want from healthcare? And how can healthcare CIOs protect vital identity infrastructure from attacks? Guido Grillenmeier, Chief Technologist at Semperis, and Matt Sickles, Solutions Architect at Sirius Healthcare, walk This Week Health through the use of Purple Knight, a free tool for your Identity Threat Detection and…
What can we do about the staffing shortage in cybersecurity? With research suggesting that nearly a third of the cybersecurity workforce is planning to leave the industry in the near future, organizations are left in a worrisome position, especially as attack surfaces are growing. So, where do we move forward…