Security

Protecting Office 365 Data in a Modern World

[PRESENTATION] Protecting Office 365 Data in a Modern World This information in this presentation deck by Brian Desmond from Ravenswood Technology Group includes the following key takeaways: The traditional firewall is no longer the boundary for data and security. Controls that make decisions based on people, location, and data will enable you to protect your […]

Protecting Office 365 Data in a Modern World Read More »

Kerberos Delegation and Troubleshooting

[ARTICLE] Kerberos Delegation and Troubleshooting When things go wrong with Active Directory’s (AD’s) Kerberos implementation, troubleshooting can be a daunting task. Ninety-nine percent of the time, everything just works—so opportunities to practice troubleshooting are limited. When you do need to solve a problem, it’s important to have a good technical understanding of the protocol. One

Kerberos Delegation and Troubleshooting Read More »

How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches

[WEBINAR] How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches Active Directory exploitation is the common thread in high-profile attacks, including Colonial Pipeline, SolarWinds, Hafnium. Every day we hear about a new attack, a new vulnerability, and devastating consequences. Almost every attack is centered on finding a foothold in Active Directory, escalating privileges, and

How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches Read More »