Back to Resources
Identity Resources
Showing 31 Results
Mastering Defense: The Power of Counterintelligence in Cyber Deception
Guarding the Gateway: Managing Active Directory Attack Surface
5 Best Practices to Secure Active Directory
The Art of Cyber Deception: Strengthening Modern Defenses
Why ITDR Completes XDR
Defending Patient Privacy: Identity Security Strategies for Healthcare
Modernizing Enterprise Identity Security for Financial Services
Deception for Inside-the-Network Threat Detection
Protecting Against Credential-Based Attacks
Gain Control of Your Attack Surface with XDR and Identity
Deception: The Secret Weapon Against Identity-Based Attacks
Eagers Automotive Chooses SentinelOne Singularity Hologram To Improve Its Cybersecurity Posture
Eagers Automotive Chooses SentinelOne Ranger AD to Better Secure Its Active Directory
The Role of Identity Compromise in Recent Breaches
Choosing an Active Directory Visibility Solution
Endpoint Credential Theft: How to Prevent and Tackle The Adversary Head-On
Dynamic Deception for Industrial Automation and Control Systems
Deception Technology: A Critical Component of a Modern Cybersecurity Stack
Defending Against Identity-Based Attacks
Preventing In-Network Lateral Movement Attacks with Identity Security
Top 5 Ways to Protect Your Active Directory from Ransomware Attacks
Protecting your Identity Attack Surface
Identity Security Questionnaire
Active Directory Security Checklist
How CISOs Empower Enterprises to Develop Robust Identity Security Programs
Rise of Identity Based Attacks: How to Efficiently Protect Your Enterprise
Singularity™ Identity Vs. Browser Credential Harvesting (Prevention and Deception)
Singularity Identity Posture Management
Singularity Identity Detection & Response
Singularity Hologram
Singularity App for Azure Active Directory
Webinar
5 Best Practices for Implementing XDR