Active Directory
![Active Directory](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/27113504/active_directory1-400x200.jpg)
Guarding against DCSync attacks
Gaining access to domain admin credentials is part of the endgame in many sophisticated attacks where threat actors are trying to maintain persistence. One of the ways that …
![Active Directory](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/27113502/active_directory2-400x200.jpg)
Active Directory control: How adversaries score even bigger goals via attack paths
Microsoft Active Directory and Azure Active Directory are directory services products used for identity and access management at most major enterprises all over the world. All …
![Active Directory](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/09092731/microsoft-active-directory-400x200.jpg)
Obstacles and threats organizations face when protecting AD
Attivo Networks announced the availability of a research report conducted by Enterprise Management Associates (EMA) which focuses on Active Directory (AD), exploring the …
Attivo Networks ThreatStrike functionality helps hide real credentials from attacker tools
Attivo Networks announced a new way of protecting credentials from theft and misuse. As part of its Endpoint Detection Net (EDN) Suite, the ThreatStrike functionality allows …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101144/tools-400x200.jpg)
Finding and using the right cybersecurity incident response tools
Unpacking the layers of a cyberattack is rarely a simple task. You need to analyze many potential entry points, attack paths, and data exfiltration tactics to reveal the scope …
NAKIVO 10.4 helps customers protect their backup data against ransomware
NAKIVO has released 10.4 of NAKIVO Backup & Replication with a focus on the security of backup data and ransomware protection. The new features include immutable …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/30184922/biometrics2-400x200.jpg)
Identity management and zero trust: Where to get started
The past year has taught us all a few things, from how much we value our health to what we take for granted regarding IT. The impact of the last year should be obvious, but …
![Guido Grillenmeier](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/26114857/guido_grillenmeier_2-semperis-400x200.jpg)
How to improve your organization’s Active Directory security posture
Active Directory (AD), a directory service developed by Microsoft for Windows domain networks, is most organizations’ primary store for employee authentication and …
![Active Directory](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/09092731/microsoft-active-directory-400x200.jpg)
How to convince your boss that cybersecurity includes Active Directory
Preparing for and defending against a cyberattack demands Active Directory (AD) be part of a company’s overall strategy. But AD often gets overlooked in security discussions …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/30184922/biometrics2-400x200.jpg)
IT service desks lacking user verification policy, putting businesses at risk
48% of organizations don’t have a user verification policy in place for incoming calls to IT service desks, according to Specops Software. The information was uncovered as …
Mosyle boosts Apple device management and security with Mosyle Fuse
Mosyle announced a new approach to Apple device management and protection with the introduction of Mosyle Fuse. The product is the cloud-native solution to blend …
![Active Directory](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/09092731/microsoft-active-directory-400x200.jpg)
eBook: Protecting Active Directory
Microsoft Active Directory (AD) is ubiquitous across the corporate landscape and a perfect target for cyberattacks due to its popularity and importance. A single set of …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD