by | Jul 1, 2024 | Semperis
At Semperis, we always counsel our customers to prepare for the worst and assume that their identity systems will be breached at some point: A solid cyber-resilient AD recovery plan is critical. But the ideal scenario, of course, is to prevent an attack on the...
by | Jun 24, 2024 | Aquant
As we dive into a busy and hot summer, we’re thrilled to share some fresh and exciting updates for Aquant Service Co-Pilot. First, thank you to everyone who joined us at Service Leader Summer Camp! Your enthusiasm and participation made the event a huge success. We’ve...
by | Jun 24, 2024 | Semperis
One of the most tedious—but important—Active Directory administration tasks is assigning permissions to various people in the organization so they can access the objects and properties they need to do their work. The problem is that AD has a granular security model...
by | Jun 24, 2024 | Semperis
In the ever-evolving and complex cybersecurity landscape, Active Directory remains a critical infrastructure component for managing network resources and user authentication. However, its centrality also makes it a prime target for attackers. Among these, the...
by | Jun 24, 2024 | Semperis
Organizations in the financial services sector have less than a year to demonstrate DORA compliance. What is DORA, does it apply to your organisation, and how does DORA compliance intersect with one of today’s major cybersecurity concerns: identity threat detection...