
Kerberos Part 1 - What is it and how does it work?
Kerberos plays an important role in cybersecurity. Find out what it is and how it works in the following blog post.
September 15, 2023
Morgan Holm

You Can’t Secure What You Can’t See
DHCP and DNS transaction data can provide unique insights into the tactics of an attacker and turn the tide in a cyberthreat investigation.
September 01, 2023
Timothy Rooney

Identity Security Part 2 – Active Directory Hardening and Identity Hygiene
Enhance your identity security with Active Directory hardening and identity hygiene! Discover how Cygna Labs Entitlement and Security for Active Directory can help you to safeguard your organization's identities.
August 22, 2023
Morgan Holm

Identity Security Part 1 – Why It’s Essential
Find out why you need to fortify your identity security to protect your organization against the potential cyber risks that target digital identities.
August 15, 2023
Morgan Holm

Offering a Helping Hand Through Automation and Services
As enterprise networks have swelled from legacy LAN/WAN to private/public cloud, SDWAN, IoT, BYOD, SASE, and beyond, managing this increasing complexity has grown more challenging. DDI serves as a foundational management component of your diverse application and networking environment, and we can help ease your management complexity through automation and managed services.
August 01, 2023
Timothy Rooney

Securing Teams and M365 with Cygna Auditor – Signs of an attack in progress
In Part 1, we talked about using logon locations to detect a potential breach. However, attackers can use a VPN to attempt to thwart those detections.
July 06, 2023
Jeff Melnick

Securing Teams and M365 with Cygna Auditor – Looking at Login data
The most important part of remediating a breach is realizing that you have one in the first place.
July 06, 2023
Jeff Melnick

Streamline Your Windows Event Log Analysis with Cygna Log Consolidator
Cygna Log Consolidator provides a solution to the challenges of event log analysis.
June 22, 2023
Morgan Holm

Detect APT Activity via DNS
The DNS protocol can be abused by attackers to steal your sensitive data for exploitation. Protect your network and shutdown DNS tunnels with Cygna Radar.
June 19, 2023
Timothy Rooney

The NIST Cybersecurity Framework and DDI
Apply the NIST Cybersecurity Framework to your DDI deployments to improve DDI and overall network security.
May 01, 2023
Timothy Rooney