Dan Goater linkedin

https://www.lepide.com/blog/wp-content/uploads/2025/06/stale-ad-small.jpg
Organizations typically focus on securing their networks by purchasing firewalls, SIEMs, and advanced endpoint security… Read More
https://www.lepide.com/blog/wp-content/uploads/2024/12/threat-of-ransomware-small.jpg
In 2025, ransomware has evolved to such an extent that cyber criminals determine interesting ways… Read More
https://www.lepide.com/blog/wp-content/uploads/2023/09/gpo-configure-small.jpg
Group Policy Objects (GPOs) are valuable tools for system administrators, allowing them to manage applications,… Read More
https://www.lepide.com/blog/wp-content/uploads/2025/02/event-id-4771-small.jpg
What is Kerberos? Kerberos is a network authentication protocol used in Windows domains. It is… Read More
https://www.lepide.com/blog/wp-content/uploads/2025/02/audit-trail.jpg

What is an Audit Trail?

February 10, 2025, Auditing
Human error is the cause of 88% of data breaches according to a recent report.… Read More
https://www.lepide.com/blog/wp-content/uploads/2025/01/fincorp-security-small.jpg
The number of cyber-incidents has grown over the years, and finance is the most susceptible… Read More