News

Microsoft is reinforcing warnings about the critical role Active Directory (AD) domain controllers play in large-scale ...
Microsoft's May security update arrived on Tuesday, featuring flaw fixes for five zero-day vulnerabilities and a total patch ...
A new report by the Microsoft Threat Intelligence team has provided details on an espionage group based out of Turkey that ...
Posey's Tips & Tricks PowerShell Desktop AI Revisited, Part 3: Query Processing The third installment in this PowerShell AI series explores how user queries are processed and answered using a ...
This guide outlines how to turn Identity into a competitive advantage by adopting a future-ready, Identity-first security ...
Modern organizations rely on countless security apps and tools to protect their workforce—but are those tools being utilized ...
As a security practitioner, protecting your organization’s data and operations is becoming more complicated. Data breaches ...
The three principles of a modern Identity strategy Identity is at the heart of today’s cybersecurity challenges—and solutions. As attacks increasingly target Identity, relying on outdated ...
A roadmap for raising revenue, user experiences, and security through Identity. In this paper, we define four stages of Identity maturity and the pain points that companies encounter in each stage.