Quick response and effective recovery from cyber incidents is at the heart of the United Arab Emirates Information Assurance Regulation. Learn why compliance depends on prioritizing Active Directory security, recovery, and resilience.
In the face of a complex cyber threat landscape, the RIIO-2 Cyber Resilience Guidelines aim to provide the controls UK energy utilities need to establish security resilience for their networks. Learn why identity security is central to compliance with these requirements.
Lightning Intelligence is an easy-to-deploy SaaS security posture assessment tool for AD and Entra ID that automates identity environment scanning so you won’t miss emerging threats. In this video, Tammy Mindel, product owner of Purple Knight and Lightning Intelligence at Semperis, takes you for a tour of Lightning Intelligence: Learn…
Marty Momdian, EVP Services & Ready1 GM at Semperis, highlights the critical role of incident response in cybersecurity, emphasizing the importance of resilience against cyber threats.
For Alex Weinert, being a force for good means empowering cyber resilience—the capability to not only respond to cyber incidents but truly recover. In this interview with Anna Delaney of ISMG, he explains the importance of focusing on identity security and what it means to cultivate a resilience mindset.
Cybersecurity is about defense. Cyber resilience is about survival. Learn why the distinction is critical—and what it takes to build a resilience mindset into your incident response and recovery plan.
In our 2025 survey, Purple Knight users reveal that despite low initial security assessment scores that point to persistent security gaps, they were able to apply Purple Knight’s remediation guidance to significantly lower security risks.
In today’s threat landscape, attackers prioritize identity and access management systems like Microsoft’s Active Directory (AD) because they hold the keys to the kingdom in most enterprises. In other words: Compromise AD, and you control the organization. That’s why modern cyber resilience strategies must focus on AD security, monitoring, and…
Compliance with the EU’s NIS2 directive requires a focus on securing identity systems, which have become a key battleground for cyber defenders and attackers.
Saudi Arabia’s ECC-2 controls provide comprehensive, standards-driven cybersecurity practices for public and private organizations. Much of their guidance applies particularly to identity systems—the source of access and authentication across most critical business systems.