IT Security | April 22, 2020Breaking down the San Francisco airport hackOn April 7, 2020, the San Francisco International Airport (SFO) released a notice confirming that two of its websites, SFOConnect.com and...
Firewall Analyzer | April 22, 2020VPN 101: Streamline operations and ensure business continuity with the right VPN [ Free e-book ]In the ever-evolving business landscape, remote work has become the new normal in light of the COVID-19...
Log360 | April 21, 2020The Monopoly Man takes on privacy, data breaches, and more [Podcast series]In the second and final episode of our Expert Tech Talk podcast series, Ian Madrigal, known as the Monopoly...
Mobile Device Manager Plus | April 21, 2020Secured access to business-critical resources for your remote workforceOver the past several years, telecommuting, or remote work, has gained significant traction across a wide...
General | April 21, 2020SQL Server, Part 2: Authentication and authorization mechanisms in SQL Server, simplifiedIn the previous blog of this series, we discussed how monitoring SQL Server activities...
Applications Manager | April 20, 2020Mastering website monitoring with Applications ManagerIn the digital era, most enterprises use a web platform to reach potential customers and...
General | April 17, 2020Five worthy reads: Implementing a successful remote work environment Illustration by Amirthalingam Five worthy reads is a regular column on five noteworthy...
IT Security | April 16, 2020Hardening Windows security: How to secure your organization—Part 2We're back with part two of our three-part blog series on living-off-the-land attacks. If...
Firewall Analyzer | April 16, 2020Working from home? Be sure to follow these security best practices [Free e-book]Until now, a majority of enterprises and their employees have been safely protected by...
General | April 15, 2020COVID-19 sets the stage for cyberattacks: How to protect your business while working remotely Businesses are shifting their operations to a remote work model in the midst of the...