Dan Goater linkedin

https://www.lepide.com/blog/wp-content/uploads/2017/09/what-is-ad-audit-small.png
Organizations use Active Directory (AD) monitoring tools to ensure their systems run securely and remain… Read More
https://www.lepide.com/blog/wp-content/uploads/2025/07/ad-sermission-sprawl-small.webp
Active Directory is the backbone of access control for the majority of organizations. Resource authorization… Read More
https://www.lepide.com/blog/wp-content/uploads/2025/03/Prevent-Active-Directory-from-Malicious-Password-Attacks-small.jpg
Privilege creep is a covert, progressive risk to Active Directory (AD) settings. It occurs when… Read More
https://www.lepide.com/blog/wp-content/uploads/2025/06/stale-ad-small.jpg
Organizations typically focus on securing their networks by purchasing firewalls, SIEMs, and advanced endpoint security… Read More
https://www.lepide.com/blog/wp-content/uploads/2024/12/threat-of-ransomware-small.jpg
In 2025, ransomware has evolved to such an extent that cyber criminals determine interesting ways… Read More
https://www.lepide.com/blog/wp-content/uploads/2023/09/gpo-configure-small.jpg
Group Policy Objects (GPOs) are valuable tools for system administrators, allowing them to manage applications,… Read More