Latest Posts

Remote work: Being productive in a pandemic

Remote-work-for-enterpriseWith coronavirus (COVID-19) wreaking havoc across the globe, its disastrous effects are felt in the IT world, too. The lack of a complete work environment, as well as communication issues in development and production, will likely cause a total slowdown …

ManageEngine 3 min read Read

The Windows LDAP bind security vulnerability you should know about

The Lightweight Directory Access Protocol (LDAP) is used by directory clients to access data held by directory servers. Clients and applications authenticate with Windows Active Directory (AD) using LDAP bind operations.

There are different kinds of LDAP bind operations, including:…

ADAudit Plus 2 min read Read

Introducing our free Secure Remote Access Toolkit for IT teams

The global corporate landscape is on the brink of a complete premises lockdown in light of the COVID-19 crisis. Service disruption is inevitable, and enterprises’ business continuity plans are being put to the test. Despite this challenge, it’s heartening to …

General 3 min read Read

Why log archival is important for network security

Network devices like workstations, servers, routers, and firewalls generate a large volume of logs every day. These digital bread crumbs can be your greatest ally in network security; following them could point you towards potential data breaches and network vulnerabilities. …

Log360 2 min read Read

Free end-user password management tool to help businesses operate seamlessly while workforces are remote

COVID-19 has been declared a pandemic by the World Health Organization (WHO). As a precautionary measure for the safety of employees, most organizations are adopting mandatory work from home policy.

However, for many companies, this is an unprecedented hurdle. They …

ADSelfService Plus 1 min read Read

Shining a light on Brazil’s new data protection law

In the golden age of technology, our most valuable asset is data. Neglecting to implement effective data security measures leaves data vulnerable to theft and manipulation. This is why many countries are coming up with new data protection laws based …

General 4 min read Read

The truth about server virtualization management: Tried and true techniques

Server virtualization management is a strategy of running multiple autonomous virtual operating systems on a single physical server. By maximizing the capacity of physical resources to optimize the investment in hardware, server virtualization management offers significant cost benefits. While virtualization …

General 1 min read Read

All you need to know about NIST password guidelines

The National Institute of Standards and Technology (NIST), a physical sciences laboratory and a non-regulatory agency of the United States Department of Commerce, recently released their guidelines for password security. Some of them are contrary to what we’ve come …

ADSelfService Plus 2 min read Read

Microsoft issues KB4551762 to fix the SMBv3 Eternal Darkness flaw (CVE-2020-0796)

Microsoft has rolled out an emergency out-of-band update KB4551762 just in time to patch the vulnerability in SMBv3 (CVE-2020-0796), that was leaked as part of the March 2020 Patch Tuesday.

 On March 10, Security Advisory ADV200005 was released with Patch …

Vulnerability Manager Plus 2 min read Read