Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Access Management

Restrict clients allowed to make remote calls to SAM

The “Network access: Restrict clients allowed to make remote calls to SAM” security policy setting manages which users are permitted to view the list of users and groups stored in both the local Security Accounts Manager (SAM) database and Active Directory through remote calls. This policy setting allows you to restrict remote RPC connections to SAM. If not selected, the default security descriptor will be used.

Cyber Trends in Identity and Access Management with Simon Moffatt || Razorthorn Security

Hello Razorwire listeners! It's your host Jim here, and in today's fascinating episode, we sit down with cybersecurity veteran Simon Moffatt. With two decades under his belt in the dynamic field of identity and access management, Simon unpacks the complexities of cyber protection in our modern age. From the evolution of technology to the murky waters of liability and insurance in cybersecurity, Simon's insights shed light on the challenges and trends we face.

Improving productivity and minimizing cybersecurity costs for distributed teams

This is the fourth and final post in a series on how to secure your hybrid workforce. For a complete overview of the topics discussed in this series, download The new perimeter: Access management in a hybrid world.

Is it possible to shift on-premises Active Directory to the cloud with AWS Managed Microsoft Active Directory?

I’ve seen this question bouncing about in different forums for quite some time now. I haven’t seen any definitive answers because it always depends on the organization’s use of AD. Recently, I noticed something called AWS Managed Microsoft Active Directory. I must admit, six months ago I was not aware of AWS Managed Microsoft Active Directory, but when I started looking into this cloud-based AD solution, some connections started coming together.

Navigating the Intersection of Delegation and Authorization

In the complex world of information management and system administration, two fundamental concepts – delegation and authorization – often intersect to determine how permissions, responsibilities and security are handled. In this blog post, we'll explore the intriguing interplay between delegation and authorization and how they work together to ensure efficient access and secure operations. Delegation: Sharing Responsibility.