by | Jul 2, 2024 | Semperis
Active Directory (AD) plays a critical role as the primary identity provider for numerous organizations throughout the world, forming the backbone of access control and authentication systems. However, its central role and widespread use makes AD a prime target for...
by | Jul 1, 2024 | Semperis
At Semperis, we always counsel our customers to prepare for the worst and assume that their identity systems will be breached at some point: A solid cyber-resilient AD recovery plan is critical. But the ideal scenario, of course, is to prevent an attack on the...
by | Jun 24, 2024 | Semperis
One of the most tedious—but important—Active Directory administration tasks is assigning permissions to various people in the organization so they can access the objects and properties they need to do their work. The problem is that AD has a granular security model...
by | Jun 24, 2024 | Semperis
In the ever-evolving and complex cybersecurity landscape, Active Directory remains a critical infrastructure component for managing network resources and user authentication. However, its centrality also makes it a prime target for attackers. Among these, the...
by | Jun 24, 2024 | Semperis
Organizations in the financial services sector have less than a year to demonstrate DORA compliance. What is DORA, does it apply to your organisation, and how does DORA compliance intersect with one of today’s major cybersecurity concerns: identity threat detection...
by | Jun 12, 2024 | Semperis
Successfully recovering from an attack on Active Directory is a race against the clock. Organizations that have been through this worst-case scenario know that being able to recover your AD is just the start: The time to recover AD is a significant factor in the...