High Privilege, Low Discipline: The Risk of Everyday Admin Use in Shared Infrastructure

Most IT professionals know they shouldn’t use elevated accounts for everyday tasks. But knowing is not the problem, leaving it enabled by default it is. This article looks at how exposure happens by design when administrative accounts are allowed to log into workstations, Citrix sessions, or virtual desktops without controls. Deny the possibility by default. If an attacker compromises a single endpoint, your architecture should prevent it from becoming a breach-level incident.

Read More

PAM is Not Enough: When Forgotten Accounts Bypass Your Controls

Even mature environments misjudge the scope of their privileged access exposure. This article unpacks how real-world privilege creep unfolds, from nested AD groups to unmanaged service accounts, forgotten appliance credentials, and newly created local admins. PAM tooling helps, but it is often blind to the accounts that matter most. If your visibility stops at Domain Admins or naming convention–based groups like CyberArk-Admins-VMWare or Delinea-SA-Storage, you are not seeing the breach path.

Read More

Legacy by Design: How Protocol Defaults and Hash Exposure Still Get Us Breached

NTLM has not gone away. In many environments, it still underpins logon flows, service account authentication, and credential relay paths that defenders assume are deprecated. Protected Users is rarely enforced. Credential Guard is rare. Even when Kerberos is in use, fallback to NTLM is often quietly enabled. Add LLMNR, NetBIOS, SMBv1, Telnet, and plaintext LDAP, and attackers have everything they need to steal or relay credentials without malware, without exploits, and often without detection. This article breaks down the legacy defaults still exposing modern networks, and what defenders, incident responders, and CISOs can do to harden these protocols before someone else exploits them.

Read More