Trimarc (@trimarcsecurity) 's Twitter Profile
Trimarc

@trimarcsecurity

We are the experts in Active Directory, Entra ID, and Identity security. Find out more about our services at bit.ly/Trimarc.

ID: 703327225395986432

linkhttps://www.trimarcsecurity.com/services calendar_today26-02-2016 21:14:12

1,1K Tweet

5,5K Takipçi

140 Takip Edilen

Trimarc (@trimarcsecurity) 's Twitter Profile Photo

Hey, Blue Team Con! We'd ❤️ to see you @ our lobby meetup: 6 pm TONIGHT w/ Sean Metcalf & the Trimarc crew. Then bring your #Microsoft & #ActiveDirectory security questions to our booth & grab a Black Hills Information Security Backdoors & Breaches deck, some stickers, & an Ignis the Dragon squishy.

Hey, <a href="/BlueTeamCon/">Blue Team Con</a>! We'd ❤️ to see you @ our lobby meetup: 6 pm TONIGHT w/ <a href="/PyroTek3/">Sean Metcalf</a> &amp; the Trimarc crew. Then bring your #Microsoft &amp; #ActiveDirectory security questions to our booth &amp; grab a <a href="/BHinfoSecurity/">Black Hills Information Security</a> Backdoors &amp; Breaches deck, some stickers, &amp; an Ignis the Dragon squishy.
Trimarc (@trimarcsecurity) 's Twitter Profile Photo

Lobbycon at Blue Team Con has begun! "And they shall know you by your Trimarc shirt... and possibly your red hat. So it is written. So let us have fun" Come hang with us! 🍻

Lobbycon at <a href="/BlueTeamCon/">Blue Team Con</a> has begun!

"And they shall know you by your Trimarc shirt... and possibly your red hat. So it is written. So let us have fun" 

Come hang with us! 🍻
Trimarc (@trimarcsecurity) 's Twitter Profile Photo

Thank you to everyone who came to visit with us this weekend during Blue Team Con! The conversations were phenomenal, and we loved getting to meet so many of you. 👀 Check out hubs.li/Q02PcVgm0 to see where you can catch us next!

Trimarc (@trimarcsecurity) 's Twitter Profile Photo

Curious about how the #primaryGroupID can turn into an attack vector in #ActiveDirectory? Security Consultant Brandon Colley (Tech Brandon) shares some insights about this attribute in his article, "Primary Group Behavior, Reporting, and Exploitation." hubs.ly/Q02Pm5S90

Curious about how the #primaryGroupID can turn into an attack vector in #ActiveDirectory? Security Consultant Brandon Colley (<a href="/TechBrandon/">Tech Brandon</a>) shares some insights about this attribute in his article, "Primary Group Behavior, Reporting, and Exploitation." 
hubs.ly/Q02Pm5S90
Trimarc (@trimarcsecurity) 's Twitter Profile Photo

Join us for a Happy Hour livestream this Friday the 13th 🦇 at 11 am PT / 2 pm ET (and this time, we mean it!). We're still digesting the amazing sessions, Garrett's 🍿, & deep dish 🍕 that went down in Chicago last weekend, so we knew this week's topic HAD to be: A BLUE TEAM

Trimarc (@trimarcsecurity) 's Twitter Profile Photo

Gehen Sie zur MCTTP-Konferenz in München? ✈️ Are you going to the #MCTTP conference in Munich? Come hear Trimarc CTO Sean Metcalf (Sean Metcalf) speak on "A Decade of Active Directory Attacks: What We've Learned and What's Next" at 10:55 am on 18 September during the

Trimarc (@trimarcsecurity) 's Twitter Profile Photo

In this #TRICON TBT session, John Askew's talk, "FAST Times at Contoso High," takes us on the journey of a classic coming-of-age tale... Free-wheeling plans predictably go sideways in an awkward, humorous manner, as we gain wisdom and become more resilient to the demands of the

In this #TRICON TBT session, John Askew's talk, "FAST Times at Contoso High," takes us on the journey of a classic coming-of-age tale...

Free-wheeling plans predictably go sideways in an awkward, humorous manner, as we gain wisdom and become more resilient to the demands of the
Trimarc (@trimarcsecurity) 's Twitter Profile Photo

Have you seen the GrrCON agenda? 🔥 Chock-full of hacky goodness. 🍫 It's just 2 WEEKS AWAY and we can't wait to see everyone in Grand Rapids Sept 26-27. Come hang w/ Sean Metcalf & the Trimarc crew & check out some fantastic talks, workshops, & villages. hubs.li/Q02PMHFk0

Have you seen the <a href="/GrrCON/">GrrCON</a> agenda? 🔥 Chock-full of hacky goodness. 🍫 It's just 2 WEEKS AWAY and we can't wait to see everyone in Grand Rapids Sept 26-27. Come hang w/ Sean Metcalf &amp; the Trimarc crew &amp; check out some fantastic talks, workshops, &amp; villages. hubs.li/Q02PMHFk0
Trimarc (@trimarcsecurity) 's Twitter Profile Photo

⏰ Happy Hour livestream TODAY at 11:00 am PT / 2:00 pm ET! We'll be flappin' our yappers about Blue Team Con. In addition to the usual Trimarc Happy Hour crew, we'll have some special guests on to share stories about their #BlueTeamCon experience. It'll be a full house! Here

Trimarc (@trimarcsecurity) 's Twitter Profile Photo

Yeehaw! We're proud to be a Silver Sponsor at Wild West Hackin' Fest October 9-11 in Deadwood, SD. The Black Hills Information Security team always puts on a great show, and we're excited to see what they're cooking up for the conference theme (and for the vittles 🍲🍖). Trimarc Security will have a

Yeehaw! We're proud to be a Silver Sponsor at <a href="/WWHackinFest/">Wild West Hackin' Fest</a> October 9-11 in Deadwood, SD.

The <a href="/BHinfoSecurity/">Black Hills Information Security</a> team always puts on a great show, and we're excited to see what they're cooking up for the conference theme (and for the vittles 🍲🍖). 

Trimarc Security will have a
Trimarc (@trimarcsecurity) 's Twitter Profile Photo

🎥 In this quick #MetcalfMinutes video, Trimarc Founder & CTO Sean Metcalf (Sean Metcalf) shares his approach to evaluating and balancing potential risks, including one of the biggest issues he sees organizations make regarding risk assessment. #cyberrisk #riskassessment

Trimarc (@trimarcsecurity) 's Twitter Profile Photo

✈️ CTO Sean Metcalf (Sean Metcalf) is heading to Germany this week to speak at the #MCTTP conference on "A Decade of #ActiveDirectory Attacks: What We've Learned and What's Next" Catch his talk on 18 September directly after the keynote presentation on day 1 of the Munich Cyber

Trimarc (@trimarcsecurity) 's Twitter Profile Photo

Think your cloud environment is invincible? That's adorbs. The Trimarc Microsoft Cloud Security Assessment (MCSA) identifies issues in the environment that attackers could leverage to access data, escalate permissions, and persist. Trimarc MCSA Key Components: ✔️ Current

Think your cloud environment is invincible? That's adorbs. 

The Trimarc Microsoft Cloud Security Assessment (MCSA) identifies issues in the environment that attackers could leverage to access data, escalate permissions, and persist.

Trimarc MCSA Key Components: 

✔️ Current
Trimarc (@trimarcsecurity) 's Twitter Profile Photo

#GrrCON is next week! 🪩 We're excited about the awesome content & the FUN that those Michiganders always throw into the mix. DFIU games, CTFs (OSINT & Forensics challenges), cool villages (Car hacking, Lock picking, ICS, Hak4Kidz, D&D)... plus a ton of great workshops and

Trimarc (@trimarcsecurity) 's Twitter Profile Photo

Teilnehmer der MCTTP-Konferenz – Sehen Sie sich nach der Keynote-Präsentation heute Morgen die Sitzung von CTO Sean Metcalf mit dem Titel „Ein Jahrzehnt der Active Directory-Angriffe: Was wir gelernt haben und was als nächstes kommt“ an. Die Präsentation findet um 10:55 Uhr im

Trimarc (@trimarcsecurity) 's Twitter Profile Photo

Mitigating #ActiveDirectory security findings can be challenging for admins. Service accounts are tied to critical services & applications, and reducing the attack surface can result in a direct impact to the business. For the identity attack surface that cannot be mitigated,

Mitigating #ActiveDirectory security findings can be challenging for admins.

Service accounts are tied to critical services &amp; applications, and reducing the attack surface can result in a direct impact to the business. For the identity attack surface that cannot be mitigated,
Trimarc (@trimarcsecurity) 's Twitter Profile Photo

T-minus 2 hours until we're LIVE on the Trimarc Happy Hour w/ one of our favorite humans, @BetoOnSecurity chatting about #WindowsRecall. Start the kettle, let's spill some 🍵 Join us today @ 11a PT / 2p ET on YouTube & Twitch. hubs.li/Q02QC29j0 or hubs.li/Q02QBYRc0