We must embrace the new reality of “ Assume Breach.”Īssume breach means that we must assume that an attacker has control of a computer on the internal network and can access the same resources the users who have recently logged on to that computer has access to. We continue with the same operations and support paradigm despite the fact that internal systems are compromised regularly. While the threats have changed over the past decade, the way systems and networks are managed often have not. These talks include information about how to best protect the Active Directory enterprise from the latest, and most successful, attack vectors. I spoke about Active Directory attack and defense at several security conferences this year including BSides, Shakacon, Black Hat, DEF CON, and Derb圜on. These issues often boil down to legacy management of the enterprise Microsoft platform going back a decade or more. The past couple of years of meeting with customers is enlightening since every environment, though unique, often has the same issues.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |