IT Security | February 19, 2019Help us understand and measure your SOC performance [Survey]What gets measured gets managed. You probably intuitively sense the truth in that statement, but are you practicing it? Specifically, are you...
General | February 15, 2019Five worthy reads: AI and ML: Keys to the next layer of endpoint protectionFive worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and...
Identity and access management | February 14, 2019File server auditing: Excluding certain files and file typesIn order to improve the efficiency of audit reports, administrators auditing a file server may decide not to...
Endpoint Central | February 13, 2019Microsoft Patch Tuesday updates for February 2019Microsoft has just released this month’s security updates for its products. Before getting on with the list of...
General | February 12, 2019ROI calculators for software: Common problems and our uncommon solutionOften, organizations use ROI calculators to determine the return on investment for using...
ADAudit Plus | February 11, 2019Tracking insider threats with AIIf you thought masked hackers in dark rooms spreading malware were your only security...
General | February 8, 2019Thwart password spray attacks to secure employee access to cloud appsChances are you've heard of traditional credential-based attacks on Active Directory (AD)...
Identity and access management | February 5, 2019Telecommuting is catching up fast—it's on you to empower your workforceAccording to Upwork’s Future Workforce Report, fifty-five percent of the surveyed...
General | February 1, 2019Five worthy reads: Augmented analytics paves the wayFive worthy reads is a regular column on five noteworthy items we’ve discovered while...
OpManager | February 1, 2019Mastering the art of network administrationNetwork administration is a job that’s easier said than done. The heterogeneity of the...