[blog]

The authority on identity and security in Microsoft

Does securing your business keep you up at night? Sleep better staying in the know – read our experts unique takes on trends in cybersecurity. 

When you hear the phrase “art of deception,” you might think of street magicians dazzling crowds of onlookers with their sleight of hand tricks and illusions. For me, it brings [...]

One of the most dangerous phases of a cyberattack is privilege escalation, which involves a bad actor getting access to network resources via compromised user accounts and then elevating the [...]

As organizations increasingly embrace digital transformation, electronically stored data is a company’s most valuable asset. Unfortunately, it’s also one of the most vulnerable. Whether it’s customer records, financial data, intellectual [...]

This blog post is a follow up to my previous post on leveraging Azure Blob Storage to serve HTTP certificate revocation lists (CRLs). If you have not already done so, [...]

Microsoft’s Active Directory (AD)—released in 1999 as part of Windows 2000 Server Edition—is currently the most popular directory service for Windows domain networks. AD has evolved and matured over the [...]

Maintaining security in a Windows environment is important to reduce the risk of bad actors being able to cause harm to an organization. Although Windows is built to be secure [...]

Remote Desktop Gateway (RDG) is a widely deployed Windows Server Role that allows secure remote access to a protected resource (e.g. a Windows Server via Remote Desktop Protocol (RDP)). There [...]

HR-driven provisioning is a capability of Entra ID that allows data from Human Resource (HR) systems to be used to create and update accounts in Entra ID or Active Directory. [...]

Public key infrastructure (PKI) is the bedrock of modern telecommunications. It is a foundational technology to uniquely identify clients and facilitate their secure transmission and storage of data between public [...]

Today, we’ll explore the signs of a pass-the-hash (PtH) attack and discuss methods to detect and prevent such attacks in your environment. At Ravenswood Technology Group, LLC, we have decades [...]

There are many components of Microsoft Active Directory Domain Services (AD DS) that can be assessed as part of a health check. Which ones to start with is, of course, [...]

By now, you’ve likely heard about Microsoft’s mandate requiring multifactor authentication (MFA) for all accounts accessing Microsoft Entra portals and APIs. If you haven’t already started, it’s time to address [...]