Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
Ravie LakshmananFeb 02, 2026Kerberos / Enterprise Security Microsoft has announced a three-phase approach to phase out New Technology LAN Manager...
Ravie LakshmananFeb 02, 2026Kerberos / Enterprise Security Microsoft has announced a three-phase approach to phase out New Technology LAN Manager...
In 2025, we spent a lot of time with enterprise SOC teams, CISOs, and large MSSPs. Discovery calls. Technical deep...
Authentication is the foundation of application security, yet it's one of the most frequently mishandled aspects of software development. With...
If you’re running a B2B fintech in 2026, you already know that "Enterprise Readiness" isn't just a buzzword—it's the difference...
Ravie LakshmananJan 30, 2026Vulnerability / Enterprise Security Ivanti has rolled out security updates to address two security flaws impacting Ivanti...
January 2026 was a wake-up month for enterprise security teams. In a single week, CERT-In released three high-severity advisories exposing...
What Are Non-Human Identities and Why Do They Matter in Complex Enterprise Environments? Where digital transformation accelerates work processes, the...
Enterprise technology is entering a state of deeper amalgamation and flux. Not because data integration suddenly became important (spoiler alert,...
Ravie LakshmananJan 24, 2026Vulnerability / Enterprise Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical...
The Enterprise Paradox: Why we still use XML in 2025 It's 2025 and we are still arguing about xml tags...
The high stakes of isolation in enterprise saas Ever had that sinking feeling where you realize a user might've seen...
The problem with manual onboarding in enterprise apps Ever tried onboarding 50 new hires on a Monday morning only to...