Tag:

Every security team has lived through Shadow IT. First, it was cloud storage with Dropbox, then Box, then Google Drive. Tools appeared faster than procurement could react, and security teams [...]

Many organizations first learn about the Active Directory (AD) Protected Users group during an external audit or penetration test. It often begins with an auditor asking, “Why haven’t you placed [...]

I love to fish. There is nothing more relaxing to me than being on a quiet pond in the early morning hours as the rising sun slowly burns off the [...]

As industries evolve, so too does the implementation of their existing technologies. Public Key Infrastructure (PKI) is no different. Many organizations are preparing for the widely anticipated Client Authentication EKU [...]

Microsoft Intune is a leading solution for modern device management, offering administrators powerful tools for deploying policies, maintaining compliance, and securing endpoints across a diverse organizational landscape. Among its most [...]

The value of Privileged Access Workstations (PAWs) is commonly known in the realms of cybersecurity architecture and identity governance, as they help defend your IT environment by reducing the attack [...]