Global Security

Folks,A few days ago I asked a (seemingly) very simple question ; no I’m not referring to this one, I’m referring to this one here  -Can Anyone (i.e. any Cyber Security Company or Expert) Help Thousands of Microsoft’s Customers MITIGATE the Risk P…

Read More Mimikatz DCSync Mitigation

Folks,A few days ago I asked a (seemingly) very simple question ; no I’m not referring to this one, I’m referring to this one here  -Can Anyone (i.e. any Cyber Security Company or Expert) Help Thousands of Microsoft’s Customers MITIGATE the Risk P…

Read More Mimikatz DCSync Mitigation

Folks,A few days ago I asked a (seemingly) very simple question ; no I’m not referring to this one, I’m referring to this one here  -Can Anyone (i.e. any Cyber Security Company or Expert) Help Thousands of Microsoft’s Customers MITIGATE the Risk P…

Read More Mimikatz DCSync Mitigation

Folks,Hello again. Today onwards, as I had promised, it is finally TIME for us to help SAFEGUARD Microsoft’s Global Ecosystem.Before I share how we uniquely do so, or answer this paramount question, or ask more such ones, I thought I’d ask likely the m…

Read More WHAT is the ONE Essential Cyber Security Capability WITHOUT which NOT a single Active Directory object or domain can be adequately secured?

Folks,Hello again. Today onwards, as I had promised, it is finally TIME for us to help SAFEGUARD Microsoft’s Global Ecosystem.Before I share how we uniquely do so, or answer this paramount question, or ask more such ones, I thought I’d ask likely the m…

Read More WHAT is the ONE Essential Cyber Security Capability WITHOUT which NOT a single Active Directory object or domain can be adequately secured?

Folks,Hello again. Today onwards, as I had promised, it is finally TIME for us to help SAFEGUARD Microsoft’s Global Ecosystem.Before I share how we uniquely do so, or answer this paramount question, or ask more such ones, I thought I’d ask likely the m…

Read More WHAT is the ONE Essential Cyber Security Capability WITHOUT which NOT a single Active Directory object or domain can be adequately secured?