Cygna Labs
Book a Demo
shield

Strengthen your organization’s cybersecurity posture with software solutions from Cygna Labs

DDI Impacts Everything

DDI Impacts Everything

As foundational networking technology, DDI touches every aspect of your network from LAN/WAN to SDWAN/SASE to multi-cloud deployments.

July 16, 2024

Timothy Rooney

Entra ID Account Takeover – Part 2

Entra ID Account Takeover – Part 2

Bad actors can hijack Entra ID (Azure AD) accounts via sync attacks. To mitigate threats, you should follow Microsoft recommended best practices and enable multi factor authentication (MFA) for your Entra ID privileged accounts.

July 02, 2024

Morgan Holm

Entra ID Account Takeover – Part 1

Entra ID Account Takeover – Part 1

Attackers can exploit Entra (Azure AD) Connect to take over privileged accounts in Entra ID. Learn about the Entra Connect Sync process and its role in identity synchronization.

June 18, 2024

Morgan Holm

What matters in a DDI solution? (Part 2)

What matters in a DDI solution? (Part 2)

DDI information is vital to cyberthreat investigations and leading DDI solutions offer differing approaches. Review key DDI cybersecurity requirements you should consider.

May 02, 2024

Timothy Rooney

How do you improve cybersecurity for your identity infrastructure? Part 3

How do you improve cybersecurity for your identity infrastructure? Part 3

Discover seamless recovery solutions for Active Directory & Entra ID (Azure AD). Cygna ensures swift rollback, granular recovery, & enhanced cybersecurity for your identity infrastructure.

April 16, 2024

Morgan Holm

What matters to you in a DDI solution? (Part 1)

What matters to you in a DDI solution? (Part 1)

What’s important for one user may differ from another. Examine the key attributes of leading DDI solutions to evaluate what works best for your network.

April 09, 2024

Timothy Rooney

DDI for IIoT (Part 2)

DDI for IIoT (Part 2)

DDI considerations for the Industrial Internet of Things (IIoT) comprises a class of IoT specifically related to manufacturers, utilities, and public safety organizations.

March 15, 2024

Timothy Rooney

How do you improve cybersecurity for your identity infrastructure? Part 2

How do you improve cybersecurity for your identity infrastructure? Part 2

In today's digital landscape, safeguarding identity systems is paramount to maintaining security within any organization. This blog post delves into the critical role of change auditing in monitoring and protecting Active Directory (AD) and Entra ID (Azure AD), essential components for managing and securing identities.

March 04, 2024

Morgan Holm

DDI for IIoT (Part 1)

DDI for IIoT (Part 1)

The Industrial Internet of Things (IIoT) comprises a class of IoT specifically related to manufacturers, utilities, and public safety organizations in particular and require special DDI considerations.

February 12, 2024

Timothy Rooney

How do you improve cybersecurity for your identity infrastructure? Part 1

How do you improve cybersecurity for your identity infrastructure? Part 1

Active Directory (AD) entitlements play a pivotal role in safeguarding your organization, serving as the primary means for authentication and authorization. This blog post emphasizes the criticality of minimizing the attack surface by implementing delegated AD security, adhering to the principle of least privilege. Learn how to validate user access, identify high-risk permissions, and address the challenges of managing and hardening entitlements.

February 06, 2024

Morgan Holm

categories