IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance

IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance

Cyberattacks are a growing threat, and organizations are investing time and money in security strategies to make certain that their infrastructures are secure. Active Directory (AD) is a constant target for compromise,... Read more »
IT security: PowerShell as a cyberattack tool

IT security: PowerShell as a cyberattack tool

Tools and features introduced with the intention of benefiting and empowering an organization can sometimes end up being misused. PowerShell is a classic example. PowerShell is a more powerful command-line interface that... Read more »

How many domain admins is too many?

Administrative accounts and groups have powerful rights, privileges, and permissions to perform critical actions in Active Directory (AD), member servers, and workstations. There are four main built-in administrative groups in AD: Enterprise... Read more »

Two-factor authentication for secure access to cloud apps in hybrid AD

In an earlier post, we dealt with the benefits of single sign-on (SSO) for cloud apps in hybrid Active Directory (AD). While SSO is good in the sense that it simplifies user... Read more »