Skip to main content

Resources

Home > Resources

Mobile Number Sync Issues with Entra ID

How We Fixed a Mysterious Mobile Number Sync Issues with Entra ID A deep dive into bypassing Entra ID Connect’s silent attribute sync failures Discovering the Issue Between Active Directory and Entra ID We were called in to troubleshoot an issue where a few users’ mobile phone numbers in Entra ID would not update, even […]

Golden Ticket Attacks & 2FA

Using 2FA to Turn the Tides on a Golden Ticket Attack When an attacker gains access to a Windows server, that server can easily be turned into a weapon to be used against your infrastructure and data.  And of all the ways that can be done, one of the most severe attacks that can be […]

Umbrella SIG: A Field Guide to Protecting Remote Users

The Problem Here’s the situation – you have a group of users who work a hybrid schedule.  One of the users, while working at home, gets malware from a compromised website.  That malware-infected PC gets taken back to the office and put on the corporate network, whereupon the malware now can try and spread to […]

Supporting Work From Home Users with Cisco ThousandEyes

A powerful network monitoring solution that takes your troubleshooting up a notch. The Problem If you’re supporting a large remote workforce, you’ve had an executive call on Monday morning to say: “I joined a meeting over the weekend and audio quality was terrible. Can you make sure it doesn’t happen again?” Pre-pandemic, it may have […]

Using Ansible to Tackle Shadow IT Programmatically

Scripting with Ansible and Python How to Find Rogue, Unmanaged Devices Client Issue  A client came to us with a complicated global network environment of engineers, developers, and executives. They were facing the same issues that many larger companies with multiple IT departments and variable infrastructure face – non-uniformity, rogue devices, poor historical reporting, security […]

Zero Trust in the Campus

When looking at what the major risks are to the security and functionality of IT infrastructure, near the top is access to that infrastructure.  Being able to ensure that only authorized devices and users can connect to the network is one of the most effective ways of protecting your infrastructure and data.  Users who pick […]

Zoom and Cisco Room Kit One Button to Push

Solving a persistent problem between two meeting clients The Problem A client recently came to us with an issue they were having with their suite of various models of Cisco Cloud registered Room Kit systems. Zoom and WebEx are both utilized for their meeting clients.  They were able to use the one button to join […]

Zero Trust in the Datacenter: Machine to Machine Security

How Machine to Machine security differs from User to Machine Now that we’ve looked at user to machine security in the datacenter, it’s time to look at machine to machine security (also known as east-west security).  The goals of machine to machine security are going to be quite different than user to machine security, and […]

Zero Trust is a Philosophy, Not a Product or Plan

One of the current trends in IT security that gets a lot of press and discussion is the idea of zero trust.  Zero trust, however, is really a philosophy, not a plan of action.  Specifically, zero trust is the philosophy that all IT resources, whether internal or external, should be treated as untrusted or even […]