Active Directory
‘China’ Azure Breach: MUCH Worse Than Microsoft Said
Richi Jennings | | Active Directory, Authentication, azure, Azure Active Directory, Azure AD, Entra ID, Exchange, Microsoft, Microsoft Azure, Microsoft Azure Active Directory, Microsoft Azure Security, OpenID, Outlook.com, SB Blogwatch, Storm-0558, Wiz
Storm-0558 Breaks: Satya and Pooh, sitting in a tree, K.I.S.S.I.N.G ...
Security Boulevard
A Guide to GDPR Compliance
Enzoic | | account takeover, Active Directory, Data breaches, Identity Breach Monitoring, Regulation and Compliance
Read the key steps an organization handling EU citizens' data should initiate if a data breach transpires to comply with GDPR. The post A Guide to GDPR Compliance appeared first on Enzoic ...
Microsoft Entra Expands, Azure Active Directory is Now Entra ID
Microsoft revealed its Azure Active Directory (Azure AD) enterprise identity service will be rebranded Entra ID, a change that will occur by the end of the year ...
Security Boulevard
China Breaches Microsoft Cloud — Spied on US Govt. Email
Richi Jennings | | Active Directory, Authentication, Azure Active Directory, Azure AD, Exchange, Microsoft, Outlook.com, SB Blogwatch, Storm-0558
Storm-0558 Brewing: Multiple Microsoft failures cause data leaks at State and Commerce depts., plus 23 other orgs ...
Security Boulevard
What is Tier Zero — Part 1
What is Tier Zero — Part 1Tier Zero is a crucial group of assets in Active Directory (AD) and Azure. Its purpose is to protect the most critical components by creating a security boundary and ...
AD Security 101: Lock Down Risky User Rights
Daniel Petri | | Active Directory, active directory security, AD, ad security, AD Security 101, Purple Knight, Uncategorized
In Active Directory (AD) environments, you can use Group Policy Objects (GPOs) to configure user rights. By using GPOs, you can easily enforce consistent user rights policies across all computers... The post ...
Making Password Management and Employee Productivity a Win-Win Situation
The most efficient password management tactic is to screen all passwords against a list of commonly known and exposed credentials. The post Making Password Management and Employee Productivity a Win-Win Situation appeared ...
AD Security 101: Domain Controller Security
For organizations that use Active Directory (AD), securing domain controllers (DCs) is an essential part of AD security. DCs are critical components of the IT infrastructure. These servers hold sensitive and security-related ...
Identity Attack Watch: AD Security News, April 2023
As cyberattacks targeting Active Directory continue to rise, AD security, identity, and IT teams face mounting pressure to monitor the evolving AD-focused threat landscape. To assist IT professionals in comprehending and preventing ...
Audit Passwords in Your Environment
Enzoic | | Active Directory, Continuous Password Protection, Data breaches, Password Security, Password Tips
Scanning for security gaps in Active Directory is an essential step in mitigating the risk of a potential breach. Run a password audit. The post Audit Passwords in Your Environment appeared first ...