Disruptive Technology: How Businesses Are Adapting to AI, Blockchain, and IoT
Nearly all attacks require an identity to be compromised at some point. The majority of organisations store identities using Microsoft Active Directory to manage the users’ access rights and control the use of privilege. The use of identities can be traced via domain controllers, which authenticate users to access areas of IT infrastructure. Attackers will target these devices as they seek out data of value; however, their behaviour will differ from that of legitimate users, especially as they attempt to enhance their privilege. These anomalies can be detected with the right tools, enabling indicators of compromise to be identified at a critical stage.
In this podcast, Bob Tarzey speaks with Vivin Sathyan, Senior Security Expert at ManageEngine. Vivin identifies six key events that ManageEngine believes should be closely monitored. He also provides insight into how ADAudit Plus uses ML to improve its performance over time and how it works alongside SIEM tools. Also, Vivin explains the broad reach of ADAudit Plus to track the use of identities and file access. Finally, he looks at the potential for ADAudit Plus to track abuse of privilege.
Join 34,209 IT professionals who already have a head start
Over two-thirds of IT security decision-makers report an increase in cybersecurity budgets for 2024
Stratio: Why Data Fabric is the only pathway to enterprise Generative AI
Pentera: Automated Security Validation and Empowering Pen Testing Teams
Ontotext: Demystifying Semantic Standards and Knowledge Graphs
Ontotext: Turning Your Property Graph into a Robust Knowledge Graph
Ontotext: Knowledge Graph Implementation: Costs and Obstacles to Consider
Zero Networks: The Problem with VPNs
Palo Alto Networks: Global retailer cuts insurance premiums by 30%
Solution Brief: GPU Accelerated Insights with Hitachi Content Software for File & SQream
Palo Alto Networks: 2023 Unit 42 Attack Surface Threat Report