Latest Posts

Guide to keeping cyber insurance premiums low amidst rising threats

Cyberattacks have become an unavoidable part of the technology landscape in recent years with attacks like ransomware, phishing, and whaling reaching an all-time high. According to IBM’s Cost of Data Breach Report 2022, the average cost of a …

General 2 min read Read

Automated incident response using Log360

Security teams are often overwhelmed with alerts daily, including false positives, and actions that require attention but might be placed on the back burner. But when alerts start stacking up and aren’t addressed promptly, important security concerns might go unnoticed …

Log360 3 min read Read

How a global leader in car audio technology reduced its downtime by 40% in 8 months with Applications Manager

As a pioneer of audio electronics solutions for all in-vehicle communication demands, this organization has delivered an enhanced driving experience to more than 50 million vehicles across the globe. 

With over 60 years of experience, this organization has been a …

Applications Manager 2 min read Read

Lightweight Directory Access Protocol (LDAP) decoded for beginners

If you are a beginner on your Active Directory (AD) learning journey, then you must have stumbled upon the term LDAP. It’s quite possible that you feel a little lost trying to understand this concept. The objective of this blog …

Active Directory 3 min read Read

Five worthy reads: Privacy vs. monetization

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we are exploring a user’s choice between privacy and monetization.

 

Since the advent of the internet, personal data …

General 4 min read Read

A practical approach to Active Directory Domain Services, Part 10: A study into Group Policies and AD

We have covered a plethora of topics on Active Directory (AD) in parts one to nine of this series on Active Directory Domain Services. 

In this final and 10th part, we will look at one other crucial aspect of AD—Group …

Active Directory 4 min read Read

Checksum: How does it ensure security for your vital data?

A checksum is small code of computed information that deals with data integrity and security. It is vital for huge data files (in gigabytes) being downloaded from any online site. It checks whether the downloaded file is missing any bytes …

Network Configuration Manager 2 min read Read

Active Directory sites in a nutshell


An Active Directory (AD) environment has things like forests, trees, domains, organization units, and objects. After growing acquainted with these concepts, the next step on this learning journey is to understand AD sites.

What are AD sites?

AD sites are …

Active Directory 4 min read Read

Info-Tech Research report 2022: 98% of customers say they love OpManager!

Choosing the best network monitoring tool can be mind boggling. Today, network admins need more than a bare-bones network management system (NMS). They need a tool that includes auto-discovery, node and device inventorying, automatic and configurable warning notifications—all joined through …

OpManager 2 min read Read