AD360 | April 16, 2021Operation panopticon: How a weak IAM strategy led to the security camera hack across organizationsOn March 9, 2021, Verkada, a software company that specializes in making security cameras for monitoring physical access control, was subject to a...
General | April 16, 2021Five worthy reads: Location intelligence—the key to next-level data utilizationFive worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and...
Patch Manager Plus | April 14, 2021Microsoft Patch Tuesday April 2021 fixes 108 vulnerabilities, including 5 zero-daysYet another month, yet another Patch Tuesday. With the never-ending cybersecurity threats brought on by the...
ADSelfService Plus | April 6, 2021The road ahead: McKinsey's top 5 cybersecurity predictions for 2021 and beyondWhat is a bigger threat to mankind: nuclear weapons or cybercrime? While most would say nuclear weapons,...
General | April 1, 2021Is the cloud coming to all of us?During the past twenty years, so much has changed in the IT office. Two decades ago, we...
General | March 31, 2021Five worthy reads: The unexpected costs following a cyberattackFive worthy reads is a regular column on five noteworthy items we’ve discovered while...
Log360 | March 30, 2021Azure security 101: Security essentials, logs, authentication, and more“Where necessity speaks, it demands”. This old saying seems particularly apt right now...
ADAudit Plus | March 24, 2021Windows logon auditing: Everything you need to know in only 10 minutes [Free e-book]User logon activity needs to be audited to meet various security, operational, and...
OpUtils | March 23, 2021Unraveling open port threats and enhancing security with port scanning toolsFrom exposing your network vulnerabilities to becoming a passageway for intruders, open...
General | March 12, 2021Five worthy reads: Understanding quantum computing and its impact on cybersecurityFive worthy reads is a regular column on five noteworthy items we discovered while...