Insights from IBM’s 2024 Cost of a Data Breach Report

The cost of a data breach has reached alarming levels. The global average spiked to $4.88 million, a 10% increase over the previous year ...

Enzoic for Active Directory 3.5: Elevating Visibility Into Your Environment

Version 3.5 of Enzoic for Active Directory aims to provide greater visibility and control over your environment ...

Securing from Active Directory Attacks

Active Directory (AD) lies at the heart of your organization’s Windows network, silently orchestrating user access, authentication, and security. But do you truly understand its workings? This blog peels back... The post ...
Hybrid Attack Paths, New Views and your favorite dog learns an old trick

Hybrid Attack Paths, New Views and your favorite dog learns an old trick

Introducing Hybrid Attack PathsDeath from Above: An Attack Path from Azure to Active Directory With BloodHoundWhen we introduced Azure Attack Paths into BloodHound, they were added as a completely separate sub-graph. At no ...

NYDFS Cybersecurity Regulation: Automated Blocking of Commonly Used Passwords

NYDFS introduced its 2nd amended Cybersecurity Regulation. One requirement is the automated blocking of commonly used passwords ...

Understanding Penetration Testing

1. What is a penetration test (pentest)? A penetration test, or pentest, is a simulated cyberattack on your system to identify vulnerabilities before malicious actors can exploit them. It’s a proactive approach ...

Best Practices for Active Directory Backup

Maintaining business continuity during and after a cyberattack has become a chief strategic objective, not just for enterprise cybersecurity, but for IT and business leadership as well. Effective Identity Threat... The post ...
2024 Verizon DBIR

2024 Verizon DBIR: Key Thoughts

It’s DBIR season once again, and, as usual, the Verizon team has produced a detailed and comprehensive (and humorous) exemplar of statistical cybersecurity analysis and reporting. Last year, we noted that the ...
an open book.

Identity, Credential Misconfigurations Open Worrying Security Gaps

A report found more than 40 million exposures are impacting 11.5 million critical business entities, with more than half related to cloud platforms ...
Security Boulevard
Manual LDAP Querying: Part 2

Manual LDAP Querying: Part 2

This post is a follow-up to my previous post on manual LDAP querying. I would highly recommend reading that post prior to reading this one if you are interested in some of ...

Application Security Check Up