This website uses cookies to ensure you get the best experience on our website. Learn more
Articles written by Marcus White
-
Jun
13
Six ways to apply the principle of least privilege to your Active Directory
The principle of least privilege is simple but important: it states that users only have the minimum access necessary to perform their job. For organizations using Active Directory (over 90% of the Fortune 100), this means the minimum necessary permissions…
Read More -
May
17
[New Research] How hard is the MD5 hashing algorithm to crack?
The Specops research team is publishing new data on how long it takes attackers to brute force guess user passwords with the help of newer hardware. They've been specifically looking at passwords protected by the popular MD5 hashing algorithm. This…
Read More -
May
23
Guide to the PCI-DSS v4.0.1 regulations [Updated for 2025]
The PCI DSS compliance framework has been a staple in the cybersecurity realm for businesses handling credit card transactions. The Payment Card Industry Data Security Standard was developed to encourage and enhance payment card account data security. It helps define consistent security measures…
Read More -
Feb
28
What is Active Directory (AD) and how does it work?
Active Directory (AD) is Microsoft’s directory service for Windows domain networks—a centralized database that stores information about users, computers, groups, policies and other objects in your network. It uses a hierarchical, object-oriented structure to organize resources, allowing administrators to manage…
Read More -
Jan
24
Zero to hero: How zero-trust models protect against cyber-attacks
Perimeter-based security models were built for a world where corporate networks had clear boundaries—but that world no longer exists. Modern enterprises operate in hybrid environments with cloud services, remote workforces, and third-party integrations, creating countless entry points for attackers. The…
Read More -
Oct
12
How to configure the NCSC password list in AD
Passwords are one of the weakest links when it comes to ensuring that your environment is secure. Traditional user accounts and the associated passwords have long been the default security mechanism found in most environments. With the very advanced and…
Read More -
Sep
23
How to find Active Directory passwords set to never expire
Passwords set to never expire can be a security vulnerability for your network. Here is how to to find Active Directory (AD) passwords set to never expire. Some regulatory bodies require passwords to expire every 90 days, while others recommend…
Read More -
Jun
03
Which authentication tools are users most comfortable with?
Authentication is the first line of defense in any organization's cybersecurity strategy, but not all authentication tools offer the same level of security, convenience, or scalability. From traditional passwords to advanced biometric and adaptive authentication, businesses must carefully choose the…
Read More -
Nov
19
How to stop different types of password attacks
What makes users and organizations vulnerable to password attacks? A recent study indicates that user’s perceptions of password security might not always match reality. Many of us overestimate the benefits of including digits or special characters in our passwords, and…
Read More -
Oct
11
Active Directory security best practices for 2025
Active Directory (AD) remains the beating heart of most enterprise networks—and that central role makes it a prime target for modern attackers. In 2025, threat actors aren’t relying on generic phishing campaigns. Instead, they’re using advanced credential harvesting techniques, exploiting…
Read More