This blog describes the identity security ecosystem. The blog covers the components of an identity security ecosystem, what each component does in an enterprise, and describes some limitations.
Cyberattacks have become a persistent threat to organizations across sectors. As the cyber threat landscape grows more complex, attacks are becoming larger and more scalable.
Acalvio Technologies and CrowdStrike Falcon® Identity Protection help customers combat increasingly sophisticated identity-based attacks.
Mitigating Microsoft Email Hack Attacks on US Federal Agencies and Western European Government Agencies
A Chinese hacking group breached email accounts of several US and Western European government agencies. What was their modus operandi and primary motive?
Earlier this month, we witnessed the US Department of Energy, several other government agencies, banks and other commercial organizations hit in a global hacking campaign
Identity based attacks are rising dramatically. According to Verizon’s 2022 Data Breach Investigation Report, credential-based attacks have become the top path for threat actors to reach enterprise information assets.
As discussed in our previous blogs, the MITRE ATT&CK framework is a critical technology resource that can help you systematically evaluate your security measures against the potential threats you may encounter. Understanding the weaknesses in your current...
In May 2017, the WannaCry ransomware attack made front-page news around the world, with at least 150 countries and over 200,000 customers affected by the attack. The WannaCry ransomware made use of an exploit that targeted the SMB protocol of Microsoft Windows.
Microsoft created Active Directory (AD), a directory service for Windows domain networks. It offers authentication and authorization services along with a centralized location for storing and managing data about resources and users on a network. AD is crucial for...