Q4FY20 Fighting Pass-the-Hash With or Without Red Forest.

Events and breaches over the last few years have exposed, in a high-profile way, particular vulnerabilities of our modern IT environments. It’s obvious now that perimeter security alone is no longer sufficient to protect our highly dynamic, connected and mobile enterprises. Additional drivers, such as insider threats, emphasize the need to protect identities. And a key component of identity management for most organizations is Active Directory (AD). As 95 percent of enterprises rely on AD as their primary authentication mechanism, AD is a popular target for the bad...

Events and breaches over the last few years have exposed, in a high-profile way, particular vulnerabilities of our modern IT environments.

It’s obvious now that perimeter security alone is no longer sufficient to protect our highly dynamic, connected and mobile enterprises.

Additional drivers, such as insider threats, emphasize the need to protect identities. And a key component of identity management for most organizations is Active Directory (AD).

As 95 percent of enterprises rely on AD as their primary authentication mechanism, AD is a popular target for the bad guys.

Read more...