Dan Goater

Dan Goater linkedin

https://www.lepide.com/blog/wp-content/uploads/2025/08/mitigate-kerberoasting-attacks-small.jpg
Kerberoasting is when attackers obtain Kerberos tickets and crack the associated credentials offline. Kerberoasting remains… Read More
https://www.lepide.com/blog/wp-content/uploads/2020/10/ransomware-attack-signs-small.jpg
Although Kerberoasting has been extensively documented and is widely acknowledged by security experts, it continues… Read More
https://www.lepide.com/blog/wp-content/uploads/2017/09/what-is-ad-audit-small.png
Organizations use Active Directory (AD) monitoring tools to ensure their systems run securely and remain… Read More
https://www.lepide.com/blog/wp-content/uploads/2025/07/ad-sermission-sprawl-small.webp
Active Directory is the backbone of access control for the majority of organizations. Resource authorization… Read More
https://www.lepide.com/blog/wp-content/uploads/2025/03/Prevent-Active-Directory-from-Malicious-Password-Attacks-small.jpg
Privilege creep is a covert, progressive risk to Active Directory (AD) settings. It occurs when… Read More
https://www.lepide.com/blog/wp-content/uploads/2025/06/stale-ad-small.jpg
Organizations typically focus on securing their networks by purchasing firewalls, SIEMs, and advanced endpoint security… Read More