Moving to the cloud? Leave NTLM behind
In the modern Microsoft environment, NTLM (“NT Lan Manager”) is a security threat you should keep an eye on. Especially when it’s about the cloud environment, Microsoft warns you to […]
In the modern Microsoft environment, NTLM (“NT Lan Manager”) is a security threat you should keep an eye on. Especially when it’s about the cloud environment, Microsoft warns you to […]
War is on. Attacks are becoming more sophisticated, hackers are becoming smarter, and so should be the defenders. The attacker eyeing your organization is looking for the misconfiguration […]
How a simple Group Policy setting can prevent a Privilege Escalation from becoming a Lateral Movement In our previous blog we wrote about the importance to monitor all endpoints […]
When hackers are successful in accessing user credentials, they can access the resources of an organization and cause a lot of damage. This normally happens unnoticed as the platform trusts […]
Have you ever wondered what happens when a certificate expires? Certificates are a critical component of keeping a platform operational and secure. All organization’s assets use certificates. Servers and […]