Active Directory
NAKIVO 10.4 helps customers protect their backup data against ransomware
NAKIVO has released 10.4 of NAKIVO Backup & Replication with a focus on the security of backup data and ransomware protection. The new features include immutable …

Identity management and zero trust: Where to get started
The past year has taught us all a few things, from how much we value our health to what we take for granted regarding IT. The impact of the last year should be obvious, but …

How to improve your organization’s Active Directory security posture
Active Directory (AD), a directory service developed by Microsoft for Windows domain networks, is most organizations’ primary store for employee authentication and …

How to convince your boss that cybersecurity includes Active Directory
Preparing for and defending against a cyberattack demands Active Directory (AD) be part of a company’s overall strategy. But AD often gets overlooked in security discussions …

IT service desks lacking user verification policy, putting businesses at risk
48% of organizations don’t have a user verification policy in place for incoming calls to IT service desks, according to Specops Software. The information was uncovered as …
Mosyle boosts Apple device management and security with Mosyle Fuse
Mosyle announced a new approach to Apple device management and protection with the introduction of Mosyle Fuse. The product is the cloud-native solution to blend …

eBook: Protecting Active Directory
Microsoft Active Directory (AD) is ubiquitous across the corporate landscape and a perfect target for cyberattacks due to its popularity and importance. A single set of …

Rethinking Active Directory security
In the wake of a cyberattack, Active Directory is sometimes dismissed as just another service that needs to be recovered, and security is an afterthought. But the hard reality …

Product showcase: Specops Password Auditor
They are often the target of many attackers who search for them like gold. Some can be easily found, while others can be more difficult to come by. However, inevitably, they …

Review: Specops Password Policy
Specops Password Policy is a powerful tool for overcoming the limitations of the default password policies present in Microsoft Active Directory environments. To be fair, …

Moving past the madness of manually updated X.509 certificates
Microsoft’s Active Directory (AD) is by far the most widely used enterprise repository for digital identities. Microsoft Active Directory Certificate Services (ADCS) is …

Securing Active Directory accounts against password-based attacks
Traditional password-based security might be headed for extinction, but that moment is still far off. In the meantime, most of us need something to prevent our worst instincts …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility