
Kerberos Part 1 - What is it and how does it work?
Kerberos plays an important role in cybersecurity. Find out what it is and how it works in the following blog post.
September 15, 2023
Morgan Holm

You Can’t Secure What You Can’t See
DHCP and DNS transaction data can provide unique insights into the tactics of an attacker and turn the tide in a cyberthreat investigation.
September 01, 2023
Timothy Rooney

Identity Security Part 2 – Active Directory Hardening and Identity Hygiene
Enhance your identity security with Active Directory hardening and identity hygiene! Discover how Cygna Labs Entitlement and Security for Active Directory can help you to safeguard your organization's identities.
August 22, 2023
Morgan Holm

Identity Security Part 1 – Why It’s Essential
Find out why you need to fortify your identity security to protect your organization against the potential cyber risks that target digital identities.
August 15, 2023
Morgan Holm

Offering a Helping Hand Through Automation and Services
As enterprise networks have swelled from legacy LAN/WAN to private/public cloud, SDWAN, IoT, BYOD, SASE, and beyond, managing this increasing complexity has grown more challenging. DDI serves as a foundational management component of your diverse application and networking environment, and we can help ease your management complexity through automation and managed services.
August 01, 2023
Timothy Rooney

Securing Teams and M365 with Cygna Auditor – Signs of an attack in progress
In Part 1, we talked about using logon locations to detect a potential breach. However, attackers can use a VPN to attempt to thwart those detections.
July 06, 2023
Jeff Melnick

Securing Teams and M365 with Cygna Auditor – Looking at Login data
The most important part of remediating a breach is realizing that you have one in the first place.
July 06, 2023
Jeff Melnick

Streamline Your Windows Event Log Analysis with Cygna Log Consolidator
Cygna Log Consolidator provides a solution to the challenges of event log analysis.
June 22, 2023
Morgan Holm

Detect APT Activity via DNS
The DNS protocol can be abused by attackers to steal your sensitive data for exploitation. Protect your network and shutdown DNS tunnels with Cygna Radar.
June 19, 2023
Timothy Rooney

The NIST Cybersecurity Framework and DDI
Apply the NIST Cybersecurity Framework to your DDI deployments to improve DDI and overall network security.
May 01, 2023
Timothy Rooney

SSO - Integrated Windows Authentication for Cygna Auditor
Authentication is an essential aspect of accessing resources including web applications.
April 19, 2023
Morgan Holm

The Power of Choice
Exercise your power of choice to select your optimal DDI solution.
April 05, 2023
Timothy Rooney

A Domain by Any Other Name
Know the signs and possible ramifications of domain name distortion.
March 21, 2023
Timothy Rooney

Finding Delegated Permissions in Active Directory
How do you know if your AD delegation is set up correctly? Use Entitlement and Security for AD to simplify collection and reporting of all permissions, including delegations.
February 14, 2023
Morgan Holm

Applying ITIL4 Discipline to DDI
IP addresses and associated DHCP and DNS functions are foundational to IT services and applications running over an IP network; these functions must be prudently managed, just as other critical network infrastructure elements are managed via the centralization of control, monitoring, and provisioning of distributed network elements.
January 27, 2023
Timothy Rooney

The Innumerable DDI Business Benefits
DNS-DHCP-IPAM (DDI) services are foundational to your network, which is foundational to your business in offering time and money saving features in the form of automation, improved security, high availability, and centrally managing your increasingly diverse network.
January 04, 2023
Timothy Rooney

Are You Dreading Audit Reporting Time?
Do you spend a lot of time creating, running, and distributing audit reports? See how you can simplify the whole process by empowering users with Cygna.
December 20, 2022
Morgan Holm

Is DHCPSEC a Thing?
Dynamic Host Configuration Protocol (DHCP) and the Domain Name System (DNS) are both foundational IP network services, enabling devices to connect to networks (via automated DHCP address and parameter assignment) and to navigate networks (via DNS name-to-IP resolution).
December 06, 2022
Timothy Rooney

How do you know who has access to what in Active Directory?
Active Directory (AD) is the primary method to provide authentication and authorization at 90% of the Global Fortune 1000 companies and the vast majority of organizations of all sizes. AD security issues can result in costly service disruptions and potentially data breaches or even non-compliance.
December 01, 2022
Morgan Holm

Do I need DDI for the Cloud?
As an extension or as the full extent of your enterprise infrastructure, ubiquitous accessibility to compute, database, and application resources in the cloud is imperative. Such accessibility implies network access, albeit with appropriate access controls, for your users to access the cloud services and applications they require.
November 23, 2022
Timothy Rooney

Stop Unwanted Changes
Active Directory (AD) is the primary identity access management solution for most organizations. It is often used for federated access, single sign-on, and or synced with cloud systems so its reach goes well beyond local on-prem systems. This makes it a highly valuable target for bad actors. AD issues can result in costly service disruptions and business-crippling downtime. Data breaches and regulatory non-compliance can cause organizations to incur significant expenses.
October 05, 2022
Morgan Holm

SD-DDI for SD-WAN
Software defined WANs (SD-WANs) offer cloud-optimized network performance and agility. Your core network services of DHCP, DNS, and IPAM (DDI) must keep pace with a software-defined DDI (SD-DDI) solution.
October 03, 2022
Timothy Rooney

Revive the Vitality of your VitalQIP deployment
Our multi-vendor DDI managed services enable you to extend the lifecycle of your embedded DDI systems without disruptive swapouts.
September 02, 2022
Timothy Rooney

MS Sentinel and Cygna Auditor
This post reviews Microsoft Sentinel and the Cygna Auditor platform to highlight some of the main differences and complimentary aspects between the two solutions.
August 09, 2022
Morgan Holm

DNS: It's not just for humans anymore
Using DNS for machine-to-machine communications improves scalability and operational flexibility
August 09, 2022
Timothy Rooney

Inglorious DDI
While keeping your network's foundational DDI services up and running won't garner you many public accolades, you are indeed an unsung hero. DDI is the foundation of your network and if any part of it fails, the entire network will suffer.
July 13, 2022
Timothy Rooney

Hybrid Exchange Auditing
Cygna Auditor provides a single correlated view of changes in Exchange Online and Exchange On-Premises.
June 23, 2022
Morgan Holm

Open Your Eyes to Better Network Security
Visibility is step one to identifying and monitoring network and DDI assets and transactions.
June 21, 2022
Timothy Rooney

DDI as code
IP Address Management (IPAM) and its corollary functions DHCP and DNS, collectively DHCP-DNS-IPAM (DDI), is often considered a necessary evil by most IT and Operations Engineers.
April 25, 2022
Timothy Rooney

Java Vulnerabilities and Exploits
The Cygna Auditor and PBMS code bases are not susceptible to java vulnerabilities and exploits.
March 31, 2022
Morgan Holm