Active Directory
Kerberoasting: Detection and Prevention in Active Directory
How Kerberoasting extracts service account credentials without elevated privileges, the Windows Event IDs that expose it, and the AD controls — gMSA, AES enforcement, SPN audit — that prevent it.
Mar 2026
10 min
All Sectors
Read Article
Active Directory
Service Account Security: The Unmanaged Identity Risk
Why service accounts are the most exploited identity type in AD — no MFA, static passwords, excessive privilege. How to enumerate them, scope privilege, and migrate to gMSA.
Mar 2026
9 min
All Sectors
Read Article
NHI Security
Non-Human Identity Security: API Keys, Service Accounts and OAuth Tokens
NHIs outnumber human identities by 10:1 and are the least governed. Inventory challenges, supply chain exposure, secrets in source code, and the controls that close the gap.
Mar 2026
10 min
All Sectors
Read Article
Privileged Access
Zero Standing Privilege: What It Is and How to Implement It
Standing privilege is what turns a credential compromise into a catastrophic breach. How to implement JIT access with Entra PIM and PAM vaults — and why DORA and NIS2 are making it mandatory.
Mar 2026
9 min
Financial / Public Sector
Read Article
CAF / NIS Regulations
NCSC CAF Objective B2: Identity and Access Control Requirements
What CAF B2.a–B2.d requires for CNI operators, the specific IGPs assessors test, and how to produce the privileged account inventory and evidence pack that supports a positive assessment.
Mar 2026
11 min
CNI / Public Sector
Read Article