<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Identity &amp; Security on Thoughts and Ramblings by Mike</title><link>https://mikedent.io/categories/identity--security/</link><description>Recent content in Identity &amp; Security on Thoughts and Ramblings by Mike</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>Mike Dent</copyright><lastBuildDate>Tue, 03 Feb 2026 15:55:13 -0500</lastBuildDate><atom:link href="https://mikedent.io/categories/identity--security/index.xml" rel="self" type="application/rss+xml"/><item><title>Identity Is the New Perimeter (And It's Under Attack)</title><link>https://mikedent.io/post/2026/2/resilient-identity/</link><pubDate>Tue, 03 Feb 2026 15:55:13 -0500</pubDate><guid>https://mikedent.io/post/2026/2/resilient-identity/</guid><description>
&lt;p&gt;I've had more conversations about identity resilience in the past six months than in the previous five years combined. Something has shifted. Customers who used to treat Active Directory as &amp;quot;set it and forget it&amp;quot; infrastructure are now asking hard questions about recovery, integrity, and what happens when (not if) their identity systems get compromised.&lt;/p&gt;
&lt;p&gt;That shift isn't paranoia. It's pattern recognition.&lt;/p&gt;
&lt;h2 id="the-target-has-moved"&gt;The Target Has Moved&lt;/h2&gt;
&lt;p&gt;For years, the security conversation centered on protecting data. Backup your files, replicate your databases, encrypt your storage. And those things still matter. But attackers have figured out something more elegant: why steal data when you can steal the keys to everything?&lt;/p&gt;</description></item><item><title>Securing Local Administrator Passwords</title><link>https://mikedent.io/post/2024/02/securing-local-administrator-passwords/</link><pubDate>Sat, 03 Feb 2024 00:00:00 +0000</pubDate><guid>https://mikedent.io/post/2024/02/securing-local-administrator-passwords/</guid><description>
&lt;p&gt;In today's rapidly evolving digital landscape, maintaining a robust security posture is imperative for businesses and organizations of all sizes. One essential aspect of this security posture is effective password management, which can often be overlooked.&lt;/p&gt;
&lt;p&gt;A question I ask my customers quite often scares me with the response.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Me:&lt;/em&gt;&lt;/strong&gt; How are you managing the local administrator passwords within your environment?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Response:&lt;/em&gt;&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Option 1: We use a consistent local admin password across all of our servers for easy access.&lt;/p&gt;</description></item></channel></rss>