New Attack Paths? AS Requested Service Tickets

While helping Andrew Schwartz with his Kerberos FAST post (which has more information about what FAST is and how it works, so have a read), I noticed something interesting. AS-REQs for machine accounts are unarmored. This is described by Microsoft here: Kerberos...

Protecting Healthcare Organizations from Ransomware Attacks

Active Directory has been a top cybersecurity tool for more than two decades. The problem with protecting AD—used by roughly 90% of the Fortune 1000 companies—from ransomware attacks is simply that it wasn’t designed for today’s security landscape. Many organizations...

GBTA Europe 2022

MEET US ATGBTA Conference Europe 2022 Brussels, Belgium 8-10 NovemberSchedule a Meeting After an amazing, and some think the best ever, GBTA Convention in San Diego, we look forward to meeting you in Brussels for GBTA Europe! While smaller than the global event, GBTA...

Purple Knight or PingCastle? A Quick Comparison

When it comes to protecting your enterprise from cyberattacks, protecting your identity infrastructure is key. Infiltrations of identity systems not only expose your most important assets and business operations to attack but can go undetected for long periods,...