Purple Knight

Crisis Control: Recovering Active Directory Under Pressure

Crisis Control: Recovering Active Directory Under Pressure

  • Semperis
  • Jan 09, 2026

The only thing worse than trying to recover AD is doing so during a full-blown business crisis. Learn what it takes to coordinate identity recovery and crisis response so that you can quickly restore identity to a trusted state under real-world conditions.

Bite-sized AD Security: Practical Steps to Strengthen Active Directory and Entra ID in 45 Minutes

Bite-sized AD Security: Practical Steps to Strengthen Active Directory and Entra ID in 45 Minutes

  • Semperis
  • Dec 14, 2025

Small, smart steps to secure AD and Entra ID – without the project plan. Active Directory is still one of the top targets for ransomware and cyberattacks. Yet many IT teams admit they “just don’t have the time” to deal with it. Years of small misconfigurations and technical debt can…

Automating Identity Protection Means Stronger Security Posture for the Town of Whitby

Automating Identity Protection Means Stronger Security Posture for the Town of Whitby

  • Semperis
  • Dec 11, 2025

For a community of 150,000, protecting identity infrastructure—a key target for attackers—required deeper insight into the AD environment’s security and configuration. Semperis DSP provided what no other solution could.

The Telecommunications Security Act and Your Identity Infrastructure

The Telecommunications Security Act and Your Identity Infrastructure

  • Semperis
  • Oct 17, 2025

The interdependent nature of telecom’s operational functions makes identity security itself a critical function. Let’s explore the steps for securing identity systems, achieving compliance with the UK’s Telecommunications Security Act, and ensuring operational resilience.

Defending the Public Sector: Confronting Cyber Threats with Limited Resources

Defending the Public Sector: Confronting Cyber Threats with Limited Resources

  • Semperis
  • Oct 07, 2025

Public sector organizations are targets for today's most dangerous cyber adversaries, and resource and staffing shortfalls leave agencies vulnerable. Learn proven approaches to cyber crisis management and resilience that can help you close security gaps.

NIST Cybersecurity Framework 2.0 and Your Identity Infrastructure

NIST Cybersecurity Framework 2.0 and Your Identity Infrastructure

  • Semperis
  • Sep 24, 2025

The NIST Cybersecurity Framework has gained international acceptance as a foundational standard, and many of its components are referenced across global cybersecurity standards and regulations. Discover how an identity-first approach empowers NIST CSF conformance—and builds true cyber resilience.

APRA CPS 230 and Your Identity Infrastructure

APRA CPS 230 and Your Identity Infrastructure

  • Semperis
  • Sep 11, 2025

As the cornerstone of operational access, Active Directory enables financial services organizations to manage access to essential data and services. However, AD is also the prime target for cyber attackers. Learn how an identity-first approach to APRA CPS 230 compliance helps organizations ensure resilient financial services.

Securing Identity Systems Against Modern Threats

Resilience in the Crosshairs: Best Practices for Securing Identity Systems Against Modern Threats

  • Semperis
  • Aug 18, 2025

Today's threat actors aren't just evolving—they're organizing. From ransomware gangs mimicking corporate structures to nation-state threats targeting critical infrastructure, security teams are facing an unrelenting wave of identity-based attacks. At the center of this onslaught is Active Directory (AD)—still the most common target for lateral movement and privilege escalation. In…

The UAE Information Assurance Regulation and Your Identity Infrastructure

The UAE Information Assurance Regulation and Your Identity Infrastructure

Quick response and effective recovery from cyber incidents is at the heart of the United Arab Emirates Information Assurance Regulation. Learn why compliance depends on prioritizing Active Directory security, recovery, and resilience.

RIIO-2 and Your Identity Infrastructure

RIIO-2 and Your Identity Infrastructure

In the face of a complex cyber threat landscape, the RIIO-2 Cyber Resilience Guidelines aim to provide the controls UK energy utilities need to establish security resilience for their networks. Learn why identity security is central to compliance with these requirements.