[blog]

The authority on identity and security in Microsoft

Does securing your business keep you up at night? Sleep better staying in the know – read our experts unique takes on trends in cybersecurity. 

Helping someone move from one house to another can either be a smooth process or a stressful one that strains relationships. Similarly, migrating from one Microsoft Active Directory (AD) forest [...]

If you’ve ever managed user accounts in Active Directory (AD), you have inevitably configured the password never expires flag on the account. The flag works exactly like the name implies: [...]

In today’s hybrid work environments, organizations face the challenge of managing and securing a growing number of devices accessing corporate resources from anywhere. Endpoint management provides the framework to address [...]

Active Directory (AD) is a hierarchical directory service that is used to secure network resources, user accounts, and data. As a result, it serves as the primary on-premises identity store [...]

In today’s business environment, the security perimeter has evolved beyond traditional network boundaries. Every device that connects to your network—from laptops and smartphones to servers and IoT devices—represents a potential [...]

Despite the rise of cloud identity platforms and the push toward modern authentication methods, Active Directory (AD) plays a critical role in many organizations, especially in environments with operational technology [...]

IT security is an important consideration for every organization, and the recent surge in cyberattacks across the globe—from both criminal organizations and state actors—has increased dramatically, fueled partly by bad [...]

As organizations embrace cloud technologies and modernize their authentication methods, they must still maintain support for their legacy on-premises environments. A key step in transitioning to a cloud-first strategy is [...]

Trying to understand the differences between Microsoft Entra Plan 1 (P1) and Plan 2 (P2)? You’re not alone. Many organizations are tasked with understanding how each of these identity management [...]

The Kerberos authentication protocol, developed by the Massachusetts Institute of Technology (MIT), is an often-discussed topic because it is a stronger form of authentication when compared to the NT Lan [...]

When you hear the phrase “art of deception,” you might think of street magicians dazzling crowds of onlookers with their sleight of hand tricks and illusions. For me, it brings [...]

One of the most dangerous phases of a cyberattack is privilege escalation, which involves a bad actor getting access to network resources via compromised user accounts and then elevating the [...]