Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Get-ADGroupMember Cmdlet: Find Active Directory Group Members

Using Active Directory security groups is a best practice for quickly and accurately assigning permissions to users, computers, and groups. But how can you get a list of all the members of a security group? While you could use the PowerShell cmdlet Get-ADGroup, group members will be identified by their distinguished names, making the results difficult to read. A better option is to use the Get-ADGroupMember cmdlet. This article provides the syntax of this cmdlet and lots of useful examples.

Types of Active Directory Groups & Scopes

Active Directory groups are sets of Active Directory (AD) objects — such as users, computers, and even other groups. Using AD groups helps simplify IT administration and ensure accurate delegation of rights and dissemination of information. Active Directory has several built-in groups, and organizations create many additional groups.

Hypothesis-Driven Hunting with the PEAK Framework

Picture yourself as a cyber detective, ready to uncover the hidden threats lurking in the shadows of your organization's network. Sounds exciting, right? Well, hypothesis-driven hunting is all about channeling your inner Hercule Poirot to stay one step ahead of adversaries working against you. The PEAK threat hunting framework identifies three primary types of hunts: In this post, we’re going to look at hypothesis-driven hunting in detail.

CrowdStrike Expands Falcon Data Replicator Capabilities to Boost SOC Performance

Are you getting the most from your data? Collecting data from across your environment can provide security teams with the visibility needed to detect and respond to threats, but large volumes of data and alerts can be overwhelming and cause excessive noise. And, not all data is useful data — some details or feeds may be irrelevant for your teams, causing unnecessary complexity and bogging down infrastructure.

Wiz's Yinon Costica: Using a self-serve model to better equip organizations and improve security posture

In this season’s finale of the Future of Security Operations podcast, Thomas chats with Yinon Costica, Vice President of Product and co-founder at Wiz, the leading cloud infrastructure security platform that enables organizations to identify and remove the most pressing risks in the cloud. Yinon has more than 15 years of experience leading cybersecurity product development teams, with expertise in the cloud security market.

What is a Kerberoasting Attack and How to Prevent It

A lot of us are fascinated with technology. Any form or mention of the subject piques an interest or at least a glance of curiosity. Unfortunately, we must endure the dark side of technology as well. From the beginning of the computer age, there have always been hackers who could match their criminal expertise to current technologies. Some hackers are concerned with small scams and easy entry points.

How to Create an Robust BYOD Policy for Your Organization

Did you know that 70% of organizations have adopted a Bring Your Own Device (BYOD) policy? As technology continues to evolve, more companies are encouraging employees to use their personal devices for work purposes. While this can increase flexibility and productivity, it also poses unique challenges in terms of security and compliance. In this article, we’ll discuss.