Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Intel Partner Connect 2021 Avaya Newsroom Experiences That Matter Lenovo GoChannelFirst The IoT Integrator NetApp Data Fabric Intel Tech Provider Zone

12 Lessons Learned From The SolarWinds Breach: RSA Conference

From scrutinizing technology suppliers and code used during the application development process to axing on-premise Active Directory, here are 12 key takeaways from the SolarWinds breach.

Back 1   2   3   ... 13 Next
photo

Dump On-Premise Microsoft Active Directory

Companies with both an on-premises version of Active Directory as well as Azure Active Directory are living in the worst of all possible worlds since they’re having to defend against cloud threats, on-premise threats, as well as the mechanisms that Active Directory uses to stay in sync across cloud and on premises, which were exploited by the SolarWinds hacker, according to Proofpoint’s Ryan Kalember.

Kalember, who is Proofpoint’s executive vice president of cybersecurity strategy, urged organizations to fully migrate to Azure Active Directory or Okta Universal Directory to eliminate both on-premise threats as well as hybrid threats like delegated admin abuse, which Kalember said is a vulnerable configuration that Microsoft had been aware of for years and didn’t actually fix.

Companies that get their directory fully in the cloud go from dealing with three different categories of very complicated to model risk to just one, Kalember said. Companies often have many applications that have always talked to the on-premise domain controller, and following Microsoft or Okta’s protocols to move that user identity and authentication to the cloud can be time-consuming, but he said it’s worth it.

 
 
Back 1   2   3   ... 13 Next

sponsored resources