Five Critical Questions To Ask Microsoft Regarding Identity /Users Credentials Security. Folks, I would like to share a thought that I consider as the most important as it relates to securing your organization’s IT assets across On-Premises and Cloud infrastructures against devastating cyber-attacks and malicious insiders breaches. I’ll recommend you all keep an OPEN MIND while reading […]
CrowdStrike Identity Protection Platform (Formerly Preempt Security) Capabilities.
CrowdStrike Identity Protection Platform (Formerly Preempt Security) Capabilities. Stopping Ransomware Threats with the CrowdStrike Zero Trust Solution. How To Do Threat Hunting with Falcon Identity Protection. How To Detect and Prevent Lateral Movements with Falcon Identity Protection. How To Detect and Prevent Suspicious Activities with Falcon Identity Protection. How To Enable Identity Segmentation with Falcon […]
Mitigating MFA Bypass Methods Used By Hackers, Pen Testers and Malicious Insiders.
Mitigating MFA Bypass Methods Used By Hackers, Pen Testers and Malicious Insiders. Folks, I’d like to share a thought on how organizations can optimize their current investments in MFA solution that has been implemented. So, when PROPERLY implemented across the hybrid IT infrastructures (on-premises and cloud), MFA solution has the capacity and capability to PREVENT 99% of credentials based […]
Practical Solution To Preventing Credentials Attacks In Organizations.
Practical Solution To Preventing Credentials Attacks In Organizations. If your organization is interested in securing its entire Active Directory credentials (not just privilege credentials), then read on. Note, Attackers don’t have to “Hack In” they login. 80% of cyber-attacks do NOT involve CVE’s, rather attackers combine harvested enterprise credentials with misconfigurations and dangerous product defaults. Criminals […]
PRACTICAL CYBERSECURITY: HOW TO STOP INSIDER THREATS WITHOUT LOGS, NO TUNING & AT AN AFFORDABLE COST.
PRACTICAL CYBERSECURITY: HOW TO STOP INSIDER THREATS WITHOUT LOGS, NO TUNING & AT AN AFFORDABLE COST. Think about the following, 1-Why stop short with just detection, when you can prevent attacks that leverage user credentials? 2- Why burden your SOC analysts with questions on false positives, when most of them can be auto resolved by the user? […]
PRACTICAL CYBERSECURITY: Defending Against One Of The Most Sophisticated Vulnerabilities In Any IT Infrastructures.
Vulnerabilities inherent in the NTLM Authentication protocol remains a massive albatross for any Active Directory based Iat infrastructures (about 90% of organizations globally have AD). Most of the sophisticated attacks performed by threat actors leverage NTLM protocol based vulnerabilities and Microsoft has STRUGGLED to get a hand on it! The post referenced here presents one […]
Exclusive: Hackers tried to exploit two zero-days in Trend Micro’s Apex One EDR platform.
Why Proactive Active Directory Security Should Be Part of Organizations Cyber Defense Toolset. Recently, hackers tried to exploit two zero-days in Trend Micro’s Apex One EDR platform, see this https://therecord.media/hackers-tried-to-exploit-two-zero-days-in-trend-micros-apex-one-edr-platform/ . Now, these sort of attacks is one the core reason why Proactive and Unified Identity Stores security platform is a non-negotiable inclusion in organization’s cyber defense […]
Active Directory Security.
Have an Active Directory infrastructures? Read this https://smsam.net/services/active-directory-security-assessment/
Active Directory Security Assessment.
Does your organization have Active Directory Infrastructure? If yes, you might want to check this out https://smsam.net/services/active-directory-security-assessment/
Optimize Your Current MFA Capabilities Across Your Entire Organization IT Infrastructures.
Traditionally, some organizations only leverage MFA mitigations to cover a subset of their IT infrastructures, i.e VPN access, few workstations, servers, and applications. Now, with the out of the box integration with CrowdStrike Falcon Zero Trust (Formerly Preempt Security) the capability of your current MFA (as contained in the attached banner) can be seamlessly extended […]