Identity-based attacks are escalating at an alarming rate. Yet, many organizations still rely on passive alerts that provide no real defense, leaving them vulnerable to threats that move too fast…
Identity-based attacks are escalating at an alarming rate. Yet, many organizations still rely on passive alerts that provide no real defense, leaving them vulnerable to threats that move too fast…
Today we’re thrilled to announce that Microsoft selected Quest as a strategic partner in two Microsoft Azure Marketplace partner programs. This underscores Quest’s ongoing commitment to help organizations and governments around the world secure and modernize…
MITRE ATT&CK reports that a “rogue” domain controller could be used to manipulate data in Active Directory. This attack, known as a DCShadow attack, requires you to have administrative rights, but also allows the actions that are modified to be hidden…
If you’re interested in Active Directory security, you’ve undoubtedly heard of the Zero Trust model. Briefly, Zero Trust is a great security model for modern IT environments because it assumes that breaches are inevitable and malicious actors…
CPU Side-channel attacks have grabbed the headlines since January 4, 2018 with the announcement of Spectre and Meltdown. In this post we’ll define side-channel attacks, what they are not and where they could impact your Active Directory securit…
Everybody’s talking about Zero Trust these days. In particular, Microsoft recently announced that it is adopting a Zero Trust model, and the NSA has issued guidance to help other organizations implement it, too.
But exactly what is it? Should your…
Psst! Want to know a great way to spread ransomware across a corporate network? Compromise the organization’s Group Policy.
Want to know a great way to cripple an organization’s defenses against data theft? Compromise Group Policy.
In fact…
You’ve undoubtedly put a variety of defenses in place to limit the ability of attackers to enter your network — but attackers are notoriously clever and persistent little devils. On the one hand, they barrage your network with brute-force attacks…
Every Wednesday in May, we’re hosting a live four-part webcast series, How to Overcome Common Hybrid AD and Cloud Security Challenges. The webcast series features a fictional character, Hank the Hacker, who represents hackers that appear in many…
If you’ve connected to headline news in any way - watch, listen, or read - since last Friday then you must have heard about the massive cyber-attack - WannaCry – a ransomware attack on Microsoft Windows operating systems that have infected more…