Back to Resources
Identity Resources
Showing 17 Results
The Role of Identity Compromise in Recent Breaches
Choosing an Active Directory Visibility Solution
Endpoint Credential Theft: How to Prevent and Tackle The Adversary Head-On
Dynamic Deception for Industrial Automation and Control Systems
Deception Technology: A Critical Component of a Modern Cybersecurity Stack
Defending Against Identity-Based Attacks
Preventing In-Network Lateral Movement Attacks with Identity Security
Top 5 Ways to Protect Your Active Directory from Ransomware Attacks
Protecting your Identity Attack Surface
Identity Security Questionnaire
Active Directory Security Checklist
How CISOs Empower Enterprises to Develop Robust Identity Security Programs
Rise of Identity Based Attacks: How to Efficiently Protect Your Enterprise
Singularity Ranger AD Assessor
Singularity Identity
Singularity Hologram
Singularity App for Azure Active Directory
Webinar
5 Best Practices for Implementing XDR