![What matters in a DDI solution? (Part 2)](/img/05_may_1.png)
What matters in a DDI solution? (Part 2)
DDI information is vital to cyberthreat investigations and leading DDI solutions offer differing approaches. Review key DDI cybersecurity requirements you should consider.
May 02, 2024
Timothy Rooney
![How do you improve cybersecurity for your identity infrastructure? Part 3](/img/a5526c90-c7da-4a8f-915d-30d3be3d38f7.jpg)
How do you improve cybersecurity for your identity infrastructure? Part 3
Discover seamless recovery solutions for Active Directory & Entra ID (Azure AD). Cygna ensures swift rollback, granular recovery, & enhanced cybersecurity for your identity infrastructure.
April 16, 2024
Morgan Holm
![What matters to you in a DDI solution? (Part 1)](/img/04_april_1.png)
What matters to you in a DDI solution? (Part 1)
What’s important for one user may differ from another. Examine the key attributes of leading DDI solutions to evaluate what works best for your network.
April 09, 2024
Timothy Rooney
![DDI for IIoT (Part 2)](/img/ddi-february_2-1-.png)
DDI for IIoT (Part 2)
DDI considerations for the Industrial Internet of Things (IIoT) comprises a class of IoT specifically related to manufacturers, utilities, and public safety organizations.
March 15, 2024
Timothy Rooney
![How do you improve cybersecurity for your identity infrastructure? Part 2](/img/improve-cybersecurity-for-your-identity-infrastructure_3.png)
How do you improve cybersecurity for your identity infrastructure? Part 2
In today's digital landscape, safeguarding identity systems is paramount to maintaining security within any organization. This blog post delves into the critical role of change auditing in monitoring and protecting Active Directory (AD) and Entra ID (Azure AD), essential components for managing and securing identities.
March 04, 2024
Morgan Holm
![DDI for IIoT (Part 1)](/img/ddi-february_3.png)
DDI for IIoT (Part 1)
The Industrial Internet of Things (IIoT) comprises a class of IoT specifically related to manufacturers, utilities, and public safety organizations in particular and require special DDI considerations.
February 12, 2024
Timothy Rooney
![How do you improve cybersecurity for your identity infrastructure? Part 1](/img/cybersecurity-february_3.png)
How do you improve cybersecurity for your identity infrastructure? Part 1
Active Directory (AD) entitlements play a pivotal role in safeguarding your organization, serving as the primary means for authentication and authorization. This blog post emphasizes the criticality of minimizing the attack surface by implementing delegated AD security, adhering to the principle of least privilege. Learn how to validate user access, identify high-risk permissions, and address the challenges of managing and hardening entitlements.
February 06, 2024
Morgan Holm
![Make Good on Your Good Intentions](/img/02-jan_1.png)
Make Good on Your Good Intentions
It’s that time of year to make your new year’s resolutions and intentions for the new year. Make an intention to streamline your DDI with the help of AI thanks to Cygna Labs DDI solutions.
January 05, 2024
Timothy Rooney
![2023 Cybersecurity – Year in Review](/img/oct-2_2-1-.png)
2023 Cybersecurity – Year in Review
2023 has proven to be another chaotic year for cybersecurity with a resurgence in ransomware and extortion. Geopolitical conflicts have also resulted in an increase in attacks by state-based actors and sympathetic groups. Governing bodies are enacting new regulations and laws around cybersecurity.
December 15, 2023
Morgan Holm
![Don’t get caught in a Windows BIND](/img/des_1.png)
Don’t get caught in a Windows BIND
If you’re running ISC BIND DNS on a Microsoft Windows platform, be aware that the latest BIND version does not support windows and versions that do are approaching end-of-life. But there are alternatives!
December 01, 2023
Timothy Rooney
![Keep Your Secrets Secret](/img/microsoftteams-image-24-.png)
Keep Your Secrets Secret
Explore the growing threat of compromised secrets in cybersecurity breaches and the important role that secrets management plays in securing digital assets. Learn how Cygna Auditor can provide real-time alerts when unauthorized secrets are created outside the designated system. Be vigilant to minimize secrets security risks.
November 15, 2023
Morgan Holm
![Plan to be more secure in ’24!](/img/oct-3_2.png)
Plan to be more secure in ’24!
The domain name system serves as both a target and a vehicle for nefarious actors. Read how to protect your critical DNS infrastructure to better protect your organization.
October 30, 2023
Timothy Rooney
![What Just happened?](/img/microsoftteams-image-8-.png)
What Just happened?
A layered security approach provides multiple opportunities to detect and mitigate a cybersecurity event. Enable multiple DDI layers within your defense in depth security strategy.
October 24, 2023
Timothy Rooney
![Cygna Security and Compliance Database Maintenance](/img/oct-2_1.png)
Cygna Security and Compliance Database Maintenance
Database maintenance is key to help ensure the reliability and performance of your Cygna Security and Compliance solutions. This post covers the steps to implement the suggested minimum maintenance for Cygna installations.
October 17, 2023
Morgan Holm
![Our Contrarian DDI Strategy](/img/oct23_2-1-.png)
Our Contrarian DDI Strategy
Here’s why it makes perfect sense to retain and evolve two powerful DDI solutions within the Cygna Labs portfolio
October 03, 2023
Timothy Rooney
![Kerberos Part 2 – How do I keep it secure and running?](/img/sep27_1.png)
Kerberos Part 2 – How do I keep it secure and running?
Kerberos plays an important role in cybersecurity. Find out how to keep it up and running and secure in the following blog post.
September 25, 2023
Morgan Holm
![Kerberos Part 1 - What is it and how does it work?](/img/sep15_1.png)
Kerberos Part 1 - What is it and how does it work?
Kerberos plays an important role in cybersecurity. Find out what it is and how it works in the following blog post.
September 15, 2023
Morgan Holm
![You Can’t Secure What You Can’t See](/img/sep01_1.png)
You Can’t Secure What You Can’t See
DHCP and DNS transaction data can provide unique insights into the tactics of an attacker and turn the tide in a cyberthreat investigation.
September 01, 2023
Timothy Rooney
![Identity Security Part 2 – Active Directory Hardening and Identity Hygiene](/img/august_2-02.png)
Identity Security Part 2 – Active Directory Hardening and Identity Hygiene
Enhance your identity security with Active Directory hardening and identity hygiene! Discover how Cygna Labs Entitlement and Security for Active Directory can help you to safeguard your organization's identities.
August 22, 2023
Morgan Holm
![Identity Security Part 1 – Why It’s Essential](/img/august_3-05.png)
Identity Security Part 1 – Why It’s Essential
Find out why you need to fortify your identity security to protect your organization against the potential cyber risks that target digital identities.
August 15, 2023
Morgan Holm
![Offering a Helping Hand Through Automation and Services](/img/july23_3.png)
Offering a Helping Hand Through Automation and Services
As enterprise networks have swelled from legacy LAN/WAN to private/public cloud, SDWAN, IoT, BYOD, SASE, and beyond, managing this increasing complexity has grown more challenging. DDI serves as a foundational management component of your diverse application and networking environment, and we can help ease your management complexity through automation and managed services.
August 01, 2023
Timothy Rooney
![Securing Teams and M365 with Cygna Auditor – Signs of an attack in progress](/img/may_3_pt2.png)
Securing Teams and M365 with Cygna Auditor – Signs of an attack in progress
In Part 1, we talked about using logon locations to detect a potential breach. However, attackers can use a VPN to attempt to thwart those detections.
July 06, 2023
Jeff Melnick
![Securing Teams and M365 with Cygna Auditor – Looking at Login data](/img/may_3_pt1.png)
Securing Teams and M365 with Cygna Auditor – Looking at Login data
The most important part of remediating a breach is realizing that you have one in the first place.
July 06, 2023
Jeff Melnick
![Streamline Your Windows Event Log Analysis with Cygna Log Consolidator](/img/may-blog-s-c_2.png)
Streamline Your Windows Event Log Analysis with Cygna Log Consolidator
Cygna Log Consolidator provides a solution to the challenges of event log analysis.
June 22, 2023
Morgan Holm
![Detect APT Activity via DNS](/img/fff16f02-7742-484a-9667-7bf7d3f152b4.jpg)
Detect APT Activity via DNS
The DNS protocol can be abused by attackers to steal your sensitive data for exploitation. Protect your network and shutdown DNS tunnels with Cygna Radar.
June 19, 2023
Timothy Rooney
![The NIST Cybersecurity Framework and DDI](/img/may_2.jpg)
The NIST Cybersecurity Framework and DDI
Apply the NIST Cybersecurity Framework to your DDI deployments to improve DDI and overall network security.
May 01, 2023
Timothy Rooney
![SSO - integrated-windows-authentication for Cygna Auditor](/img/april_1.jpeg)
SSO - integrated-windows-authentication for Cygna Auditor
Authentication is an essential aspect of accessing resources including web applications.
April 19, 2023
Morgan Holm
![The Power of Choice](/img/mar-alternative_3.jpg)
The Power of Choice
Exercise your power of choice to select your optimal DDI solution.
April 05, 2023
Timothy Rooney
![A Domain by Any Other Name](/img/mar-23_1.jpg)
A Domain by Any Other Name
Know the signs and possible ramifications of domain name distortion.
March 21, 2023
Timothy Rooney
![Applying ITIL4 Discipline to DDI](/img/fab-1_2.jpg)
Applying ITIL4 Discipline to DDI
IP addresses and associated DHCP and DNS functions are foundational to IT services and applications running over an IP network; these functions must be prudently managed, just as other critical network infrastructure elements are managed via the centralization of control, monitoring, and provisioning of distributed network elements.
January 27, 2023
Timothy Rooney