Active Directory (AD) is a powerful authentication and directory service used by organizations worldwide. With this ubiquity and power comes the potential for abuse. Insider threats offer some of the most potentials for destruction. Many internal users have over-provisioned access and visibility into the internal network.
Insiders’ level of access and trust in a network leads to unique vulnerabilities. Network security often focuses on keeping a threat actor out, not on existing users’ security and potential vulnerabilities. Staying on top of potential threats means protecting against inside and outside threats, such as Insecure Devices, Over-Provisioned Access, and Weak Password Policies.
Related Posts
Draft United Nations Convention Against Cybercrime
This is the definitive text, accompanied by the proposed UNGA resolution and interpretative note, which will be submitted…
August 8, 2024
FBI urges prioritizing security in software suppliers
The FBI, along with CISA, advises businesses and organizations to choose software suppliers that prioritize security from the…
August 7, 2024
Targeted credential theft hits cloud Snowflake customers
Snowflake revealed a “limited number” of its customers are being targeted in a credential theft campaign. The company…
June 5, 2024