Dan Goater linkedin

https://www.lepide.com/blog/wp-content/uploads/2025/03/Prevent-Active-Directory-from-Malicious-Password-Attacks-small.jpg
Privilege creep is a covert, progressive risk to Active Directory (AD) settings. It occurs when… Read More
https://www.lepide.com/blog/wp-content/uploads/2025/06/stale-ad-small.jpg
Organizations typically focus on securing their networks by purchasing firewalls, SIEMs, and advanced endpoint security… Read More
https://www.lepide.com/blog/wp-content/uploads/2024/12/threat-of-ransomware-small.jpg
In 2025, ransomware has evolved to such an extent that cyber criminals determine interesting ways… Read More
https://www.lepide.com/blog/wp-content/uploads/2023/09/gpo-configure-small.jpg
Group Policy Objects (GPOs) are valuable tools for system administrators, allowing them to manage applications,… Read More
https://www.lepide.com/blog/wp-content/uploads/2025/02/event-id-4771-small.jpg
What is Kerberos? Kerberos is a network authentication protocol used in Windows domains. It is… Read More
https://www.lepide.com/blog/wp-content/uploads/2025/02/audit-trail.jpg

What is an Audit Trail?

February 10, 2025, Auditing
Human error is the cause of 88% of data breaches according to a recent report.… Read More