{"id":43603,"date":"2024-09-05T10:31:17","date_gmt":"2024-09-05T10:31:17","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/?p=101105"},"modified":"2024-09-05T10:31:17","modified_gmt":"2024-09-05T10:31:17","slug":"the-achilles-heel-of-enterprise-security-how-moving-on-from-microsoft-active-directory-strengthens-your-security-posture","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/the-achilles-heel-of-enterprise-security-how-moving-on-from-microsoft-active-directory-strengthens-your-security-posture\/","title":{"rendered":"The Achilles\u2019 heel of enterprise security: How moving on from Microsoft Active Directory strengthens your security posture"},"content":{"rendered":"<p>High-profile, wide-ranging cybersecurity breaches\u2014the SolarWinds supply chain attack, the Colonial Pipeline ransomware incident, Russian hacking of Microsoft\u2014have brutally exposed the consequences of having inadequate identity security controls. Stolen or mishandled credentials, lateral movement by hackers looking for sensitive data across a compromised network, and privilege escalation (in which a hacker gains unauthorised access) remain the<a class=\"excerpt-read-more\" href=\"https:\/\/www.cloudcomputing-news.net\/news\/the-achilles-heel-of-enterprise-security-how-moving-on-from-microsoft-active-directory-strengthens-your-security-posture\/\" title=\"ReadThe Achilles&#8217; heel of enterprise security: How moving on from Microsoft Active Directory strengthens your security posture\">&#8230; Read more &#187;<\/a><\/p>\n<p>The post <a href=\"https:\/\/www.cloudcomputing-news.net\/news\/the-achilles-heel-of-enterprise-security-how-moving-on-from-microsoft-active-directory-strengthens-your-security-posture\/\">The Achilles&#8217; heel of enterprise security: How moving on from Microsoft Active Directory strengthens your security posture<\/a> appeared first on <a href=\"https:\/\/www.cloudcomputing-news.net\/\">Cloud Computing News<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>High-profile, wide-ranging cybersecurity breaches\u2014the SolarWinds supply chain attack, the Colonial Pipeline ransomware incident, Russian hacking of Microsoft\u2014have brutally exposed the consequences of having inadequate identity security controls. Stolen&#8230;<\/p>\n","protected":false},"author":688,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[104],"tags":[771,118],"class_list":["post-43603","post","type-post","status-publish","format-standard","hentry","category-cloud-computing","tag-enterprise","tag-security"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/43603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/688"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=43603"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/43603\/revisions"}],"predecessor-version":[{"id":43604,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/43603\/revisions\/43604"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=43603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=43603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=43603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}