Log360 | April 14, 2020The Monopoly Man features in our first-ever Expert Tech Talk podcast series. Listen now!We are pleased to launch our first-ever Expert Tech Talk podcast series featuring renowned privacy expert Ian Madrigal, popularly known as the...
IT operations management and observability | April 14, 20205 key network aspects to focus on for HIPAA complianceThe Health Insurance Portability and Accountability Act, also known as HIPAA, is a compliance standard that...
IT Security | April 13, 2020Cybersecurity challenges of the work-from-home modelJust recently, the World Health Organization declared coronavirus a global pandemic. This decision brought...
General | April 10, 2020Five worthy reads: Keeping a close eye on cybersecurity while working remotelyFive worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and...
IT operations management and observability | April 10, 2020Monitoring critical business applications while working remotelyWith a huge number of employees around the globe working remotely during the COVID-19...
Applications Manager | April 10, 2020How to effectively manage your AWS costsOften, when companies are new to Amazon Web Services (AWS), they aren't focused much on...
Security Information and Event Management | April 9, 2020Hardening Windows security: How to secure your organization—Part 1The cybersecurity threat landscape is quickly changing. Administrators have become more...
Log360 | April 9, 2020SQL Server, Part 1: Why you should monitor SQL logsOver 44 records are stolen per second every day due to data breaches, and according to the...
General | April 9, 2020Security tips for work-from-home organizations [Webinar]Many organizations including Google, Amazon, Zoho, and Twitter have adopted remote...
IT Security | April 8, 2020IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck]The definition of an “attack” is changing. The level of complexity and technical expertise...