Windows Endpoint Security: Insights from Microsoft Summit
Update on Microsoft's Windows Endpoint Security Ecosystem Summit focused on vendor feedback, safe deployment practices, and balancing security needs with performance.
November 13, 2024
Morgan Holm
DNS Anycast Addressing
Anycast addressing offers tangible benefits for DNS high availability, fault tolerance, performance, and DDoS protections and Cygna DDI solutions streamline anycast implementation.
November 04, 2024
Timothy Rooney
The DDI Universe
The old sales adage, “don’t confuse selling with installing” entered an entirely new dimension recently with claims of the availability of a universal DDI solution that goes beyond hyperbole.
October 08, 2024
Timothy Rooney
Simplifying Multi-Cloud DNS Management
Centralized management of distributed DNS services affords full control with the ease of use of a single DDI system.
September 17, 2024
Timothy Rooney
Changes Are Coming to the Microsoft Security Ecosystem
A faulty CrowdStrike update crashed 8.5M Windows systems globally, causing major outages. An estimated $10B impact prompts a Microsoft-led security summit to prevent this in the future.
September 06, 2024
Morgan Holm
DDI Enriches Cyberthreat Intelligence
DNS and IPAM forensics data is vital to clearer analysis of cyberthreat vulnerabilities and events.
August 12, 2024
Timothy Rooney
DDI Impacts Everything
As foundational networking technology, DDI touches every aspect of your network from LAN/WAN to SDWAN/SASE to multi-cloud deployments.
July 16, 2024
Timothy Rooney
Entra ID Account Takeover – Part 2
Bad actors can hijack Entra ID (Azure AD) accounts via sync attacks. To mitigate threats, you should follow Microsoft recommended best practices and enable multi factor authentication (MFA) for your Entra ID privileged accounts.
July 02, 2024
Morgan Holm
Entra ID Account Takeover – Part 1
Attackers can exploit Entra (Azure AD) Connect to take over privileged accounts in Entra ID. Learn about the Entra Connect Sync process and its role in identity synchronization.
June 18, 2024
Morgan Holm
What matters in a DDI solution? (Part 2)
DDI information is vital to cyberthreat investigations and leading DDI solutions offer differing approaches. Review key DDI cybersecurity requirements you should consider.
May 02, 2024
Timothy Rooney
How do you improve cybersecurity for your identity infrastructure? Part 3
Discover seamless recovery solutions for Active Directory & Entra ID (Azure AD). Cygna ensures swift rollback, granular recovery, & enhanced cybersecurity for your identity infrastructure.
April 16, 2024
Morgan Holm
What matters to you in a DDI solution? (Part 1)
What’s important for one user may differ from another. Examine the key attributes of leading DDI solutions to evaluate what works best for your network.
April 09, 2024
Timothy Rooney
DDI for IIoT (Part 2)
DDI considerations for the Industrial Internet of Things (IIoT) comprises a class of IoT specifically related to manufacturers, utilities, and public safety organizations.
March 15, 2024
Timothy Rooney
How do you improve cybersecurity for your identity infrastructure? Part 2
In today's digital landscape, safeguarding identity systems is paramount to maintaining security within any organization. This blog post delves into the critical role of change auditing in monitoring and protecting Active Directory (AD) and Entra ID (Azure AD), essential components for managing and securing identities.
March 04, 2024
Morgan Holm
DDI for IIoT (Part 1)
The Industrial Internet of Things (IIoT) comprises a class of IoT specifically related to manufacturers, utilities, and public safety organizations in particular and require special DDI considerations.
February 12, 2024
Timothy Rooney
How do you improve cybersecurity for your identity infrastructure? Part 1
Active Directory (AD) entitlements play a pivotal role in safeguarding your organization, serving as the primary means for authentication and authorization. This blog post emphasizes the criticality of minimizing the attack surface by implementing delegated AD security, adhering to the principle of least privilege. Learn how to validate user access, identify high-risk permissions, and address the challenges of managing and hardening entitlements.
February 06, 2024
Morgan Holm
Make Good on Your Good Intentions
It’s that time of year to make your new year’s resolutions and intentions for the new year. Make an intention to streamline your DDI with the help of AI thanks to Cygna Labs DDI solutions.
January 05, 2024
Timothy Rooney
2023 Cybersecurity – Year in Review
2023 has proven to be another chaotic year for cybersecurity with a resurgence in ransomware and extortion. Geopolitical conflicts have also resulted in an increase in attacks by state-based actors and sympathetic groups. Governing bodies are enacting new regulations and laws around cybersecurity.
December 15, 2023
Morgan Holm
Don’t get caught in a Windows BIND
If you’re running ISC BIND DNS on a Microsoft Windows platform, be aware that the latest BIND version does not support windows and versions that do are approaching end-of-life. But there are alternatives!
December 01, 2023
Timothy Rooney
Keep Your Secrets Secret
Explore the growing threat of compromised secrets in cybersecurity breaches and the important role that secrets management plays in securing digital assets. Learn how Cygna Auditor can provide real-time alerts when unauthorized secrets are created outside the designated system. Be vigilant to minimize secrets security risks.
November 15, 2023
Morgan Holm
Plan to be more secure in ’24!
The domain name system serves as both a target and a vehicle for nefarious actors. Read how to protect your critical DNS infrastructure to better protect your organization.
October 30, 2023
Timothy Rooney
What Just happened?
A layered security approach provides multiple opportunities to detect and mitigate a cybersecurity event. Enable multiple DDI layers within your defense in depth security strategy.
October 24, 2023
Timothy Rooney
Cygna Security and Compliance Database Maintenance
Database maintenance is key to help ensure the reliability and performance of your Cygna Security and Compliance solutions. This post covers the steps to implement the suggested minimum maintenance for Cygna installations.
October 17, 2023
Morgan Holm
Our Contrarian DDI Strategy
Here’s why it makes perfect sense to retain and evolve two powerful DDI solutions within the Cygna Labs portfolio
October 03, 2023
Timothy Rooney
Kerberos Part 2 – How do I keep it secure and running?
Kerberos plays an important role in cybersecurity. Find out how to keep it up and running and secure in the following blog post.
September 25, 2023
Morgan Holm
Kerberos Part 1 - What is it and how does it work?
Kerberos plays an important role in cybersecurity. Find out what it is and how it works in the following blog post.
September 15, 2023
Morgan Holm
You Can’t Secure What You Can’t See
DHCP and DNS transaction data can provide unique insights into the tactics of an attacker and turn the tide in a cyberthreat investigation.
September 01, 2023
Timothy Rooney
Identity Security Part 2 – Active Directory Hardening and Identity Hygiene
Enhance your identity security with Active Directory hardening and identity hygiene! Discover how Cygna Labs Entitlement and Security for Active Directory can help you to safeguard your organization's identities.
August 22, 2023
Morgan Holm
Identity Security Part 1 – Why It’s Essential
Find out why you need to fortify your identity security to protect your organization against the potential cyber risks that target digital identities.
August 15, 2023
Morgan Holm
Offering a Helping Hand Through Automation and Services
As enterprise networks have swelled from legacy LAN/WAN to private/public cloud, SDWAN, IoT, BYOD, SASE, and beyond, managing this increasing complexity has grown more challenging. DDI serves as a foundational management component of your diverse application and networking environment, and we can help ease your management complexity through automation and managed services.
August 01, 2023
Timothy Rooney
Securing Teams and M365 with Cygna Auditor – Signs of an attack in progress
In Part 1, we talked about using logon locations to detect a potential breach. However, attackers can use a VPN to attempt to thwart those detections.
July 06, 2023
Jeff Melnick
Securing Teams and M365 with Cygna Auditor – Looking at Login data
The most important part of remediating a breach is realizing that you have one in the first place.
July 06, 2023
Jeff Melnick
Streamline Your Windows Event Log Analysis with Cygna Log Consolidator
Cygna Log Consolidator provides a solution to the challenges of event log analysis.
June 22, 2023
Morgan Holm
Detect APT Activity via DNS
The DNS protocol can be abused by attackers to steal your sensitive data for exploitation. Protect your network and shutdown DNS tunnels with Cygna Radar.
June 19, 2023
Timothy Rooney
The NIST Cybersecurity Framework and DDI
Apply the NIST Cybersecurity Framework to your DDI deployments to improve DDI and overall network security.
May 01, 2023
Timothy Rooney
SSO - integrated-windows-authentication for Cygna Auditor
Authentication is an essential aspect of accessing resources including web applications.
April 19, 2023
Morgan Holm
The Power of Choice
Exercise your power of choice to select your optimal DDI solution.
April 05, 2023
Timothy Rooney
A Domain by Any Other Name
Know the signs and possible ramifications of domain name distortion.
March 21, 2023
Timothy Rooney
Applying ITIL4 Discipline to DDI
IP addresses and associated DHCP and DNS functions are foundational to IT services and applications running over an IP network; these functions must be prudently managed, just as other critical network infrastructure elements are managed via the centralization of control, monitoring, and provisioning of distributed network elements.
January 27, 2023
Timothy Rooney
The Innumerable DDI Business Benefits
DNS-DHCP-IPAM (DDI) services are foundational to your network, which is foundational to your business in offering time and money saving features in the form of automation, improved security, high availability, and centrally managing your increasingly diverse network.
January 04, 2023
Timothy Rooney
Are You Dreading Audit Reporting Time?
Do you spend a lot of time creating, running, and distributing audit reports? See how you can simplify the whole process by empowering users with Cygna.
December 20, 2022
Morgan Holm
Is DHCPSEC a Thing?
Dynamic Host Configuration Protocol (DHCP) and the Domain Name System (DNS) are both foundational IP network services, enabling devices to connect to networks (via automated DHCP address and parameter assignment) and to navigate networks (via DNS name-to-IP resolution).
December 06, 2022
Timothy Rooney
How do you know who has access to what in Active Directory?
Active Directory (AD) is the primary method to provide authentication and authorization at 90% of the Global Fortune 1000 companies and the vast majority of organizations of all sizes. AD security issues can result in costly service disruptions and potentially data breaches or even non-compliance.
December 01, 2022
Morgan Holm
Do I need DDI for the Cloud?
As an extension or as the full extent of your enterprise infrastructure, ubiquitous accessibility to compute, database, and application resources in the cloud is imperative. Such accessibility implies network access, albeit with appropriate access controls, for your users to access the cloud services and applications they require.
November 23, 2022
Timothy Rooney
Stop Unwanted Changes
Active Directory (AD) is the primary identity access management solution for most organizations. It is often used for federated access, single sign-on, and or synced with cloud systems so its reach goes well beyond local on-prem systems. This makes it a highly valuable target for bad actors. AD issues can result in costly service disruptions and business-crippling downtime. Data breaches and regulatory non-compliance can cause organizations to incur significant expenses.
October 05, 2022
Morgan Holm
SD-DDI for SD-WAN
Software defined WANs (SD-WANs) offer cloud-optimized network performance and agility. Your core network services of DHCP, DNS, and IPAM (DDI) must keep pace with a software-defined DDI (SD-DDI) solution.
October 03, 2022
Timothy Rooney
Revive the Vitality of your VitalQIP deployment
Our multi-vendor DDI managed services enable you to extend the lifecycle of your embedded DDI systems without disruptive swapouts.
September 02, 2022
Timothy Rooney
MS Sentinel and Cygna Auditor
This post reviews Microsoft Sentinel and the Cygna Auditor platform to highlight some of the main differences and complimentary aspects between the two solutions.
August 09, 2022
Morgan Holm
DNS: It's not just for humans anymore
Using DNS for machine-to-machine communications improves scalability and operational flexibility
August 09, 2022
Timothy Rooney
Inglorious DDI
While keeping your network's foundational DDI services up and running won't garner you many public accolades, you are indeed an unsung hero. DDI is the foundation of your network and if any part of it fails, the entire network will suffer.
July 13, 2022
Timothy Rooney
Hybrid Exchange Auditing
Cygna Auditor provides a single correlated view of changes in Exchange Online and Exchange On-Premises.
June 23, 2022
Morgan Holm
Open Your Eyes to Better Network Security
Visibility is step one to identifying and monitoring network and DDI assets and transactions.
June 21, 2022
Timothy Rooney
DDI as code
IP Address Management (IPAM) and its corollary functions DHCP and DNS, collectively DHCP-DNS-IPAM (DDI), is often considered a necessary evil by most IT and Operations Engineers.
April 25, 2022
Timothy Rooney
Java Vulnerabilities and Exploits
The Cygna Auditor and PBMS code bases are not susceptible to java vulnerabilities and exploits.
March 31, 2022
Morgan Holm
The Non-Zero Components of a Zero Trust Network
In the face of a rising tide of network infiltration attempts via increasingly diversified attack vectors, enterprises must constantly remain vigilant and proactive in managing system monitoring and attack detection solutions.
March 28, 2022
Timothy Rooney
Automate your DDI to Accelerate IT services delivery
Automation is among the key motivators for implementing an IP address management (IPAM) system.
February 17, 2022
Arno Therburg
Cygna Extends Multi and Hybrid Cloud Auditing with AWS
Cygna Auditor for AWS provides a cost effective and streamlined way to keep and view your AWS audit events.
February 17, 2022
Morgan Holm
Recovery for Azure AD
Cygna Recovery for Azure AD allows you to quickly and easily backup your Azure Active Directory data to help eliminate costly downtime.
January 25, 2022
Morgan Holm
Log4j Vulnerability
The Cygna Auditor and PBMS code bases are not susceptible to the Log4j vulnerability that is actively being exploited.
December 14, 2021
Morgan Holm
We Put You in Control of Your Data – Database Segmentation
Cygna solutions are designed to put you in control of your data. This post discusses the new database segmentation functionality allowing Cygna Auditor data to be stored on more than one database server for unmatched scalability.
October 26, 2021
Morgan Holm
We put you in control of your data – Purging
Cygna solutions are designed to put you in control of your data. There are other new related features coming soon that will be covered in additional blog articles such as database segmentation and archiving.
August 20, 2021
Morgan Holm
Auditing Policies – Cygna Auditor for Active Directory
Cygna Auditor for Active Directory auditing policies have two main purposes, to protect objects from being changed or to exclude specified activities from being captured.
July 23, 2021
Morgan Holm
Cygna Identity Feature
Organizations are moving some of their workloads to the cloud and embracing SaaS solutions like never before. However, most organizations will still have key workloads on-prem for some time due to the cost, effort or regulatory / residency issues.
March 21, 2021
Morgan Holm
Active Directory is dead, long live Active Directory
If you were to look at topics being covered at Microsoft’s conferences, announcements, or social media one could easily assume that Active Directory (AD) is dead. It is correct that many organizations are embracing SaaS solutions and are going through digital transformations.
March 17, 2021
Morgan Holm
Cygna Auditor SIEM Event Forwarding
Cygna Auditor can now forward events to SIEM systems in a standard syslog format or in a structured view to Splunk.
February 08, 2021
Morgan Holm
Cygna Labs Adds SIEM Event Forwarding and Identity Grouping Features to Cygna Auditor Version 2.0
Cygna Labs releases a new version of Cygna Auditor (v 2.0.380) that implements event forwarding to SIEM systems as well as an account mapping feature that allows for the grouping of an individual’s user accounts from multiple on-prem and cloud systems to a searchable identity.
January 25, 2021
Morgan Holm
Delegation in Cygna Auditor
The Cygna Labs platform allows you to view and combine audit information from across your hybrid multi-cloud systems in a single web console.
September 20, 2020
Morgan Holm
Configure PBMS as a Data Source in Cygna Auditor
Since Cygna Labs took over the BeyondTrust Auditor Suite (PowerBroker Management Suite) at the beginning of this year we have taken on support, maintenance, and enhancements for the products.
August 11, 2020
Morgan Holm
Cloud Computing Demystified – Part 3
The Risks & Challenges
September 19, 2019
Arno Therburg
File Server security (Part 3) – Securing your Windows File Servers
In this third and final part of “File Server Security”, we will put the final touch on our file server security recipe
December 17, 2018
Arno Therburg