AD Security 101: SIEM Tools and AD Monitoring

Before we dive into technical tips that I mentioned in my previous post, I want to raise an important point. If you’re relying solely on security information and event management (SIEM) tools for Active Directory (AD) security monitoring—especially against potential...

How to Shift Left: Your Six-Step Framework

Shorten the service lifecycle, improve customer relationships, and reduce service costs. Here’s your six-step framework to shift your customer experience left.  The concept of shifting left sounds great but how can you, as a service leader, put this concept into...

How to grow your small business: 4 strategies for success

Owning a small business isn’t easy and it can often feel like you need to be an expert in many different areas all at once. You’re expected to market your business, maintain great relationships with your customers, manage your finances, and so much more. On top of...

What Shifting Left Means For Service Organizations

Shorten the service lifecycle, improve customer relationships, and reduce service costs. Over the last decade, the evolution of service has resulted in a widening gap between rising customer expectations and growing workforce challenges. Accordingly, organizations...

AD Security Research: Breaking Trust Transitivity

While playing with Kerberos tickets, I discovered an issue that allowed me to authenticate to other domains within an Active Directory (AD) forest across external non-transitive trusts. This means that there is in fact no such thing as a “non-transitive trust.” The...