Modern information security is built on a layered defense. Each layer supports the others and presents additional obstacles to threat actors. From patch management to perimeter firewalls, each layer makes it more difficult for attackers to compromise your network. Multifactor authentication (MFA) is one of these layers. MFA has many…
An MFA fatigue attack—also known as MFA bombing—is an attack tactic, technique, and procedure (TTP) in which a threat actor floods users with multifactor authentication (MFA) requests. By overwhelming, confusing, or distracting the user into approving a fraudulent request, attackers hope to gain access to your network environment. Microsoft recently…
Within your IT infrastructure, Active Directory (AD) is the central hub for controlling access to resources and keeping your business operational. However, Active Directory’s importance to your organization puts it in the crosshairs of threat actors. If Active Directory is successfully breached, attackers can get their hands on privileged credentials…
More than 20 years after its introduction, Microsoft Active Directory security remains integral to keeping businesses available and focused on their bottom line. In this post, learn what Active Directory security requires and which best practices can help you keep ahead of attackers. What is Active Directory security? At its…
I addressed Active Directory excessive privilege in the past as part of other, broader topics. But recently I started thinking it’s a great time to dedicate an entire article to it. This is not a random thought on my part. All you need to do is look at a few…