General | October 25, 2018Application whitelisting using Software Restriction PoliciesSoftware Restriction Policies (SRPs) is a Group Policy-based feature in Active Directory (AD) that identifies and controls the execution of various...
General | October 23, 2018Top five tips for Office 365 security and compliance, Part 2In our previous blog, we broadly discussed how our webinar Top five tips for Office 365 security and...
Endpoint Central | October 19, 2018The Australian way of mitigating cybersecurity incidentsMany enterprises are actively building their IT security procedures to prevent the alarming number of...
ADSelfService Plus | October 18, 2018Empower students to reset their passwords by themselvesBack to school Active Directory password management blues are a huge problem. If you're an IT administrator at...
General | October 18, 2018Top five tips for Office 365 security and compliance, Part 1Office 365 is a favorite target for hackers across the globe. Of all the messages sent to...
General | October 17, 2018Five worthy reads: The 5G digital metamorphosis Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Endpoint Central | October 16, 2018Are your systems still running an old Windows OS? It's time to move to Windows 10In less than 20 months, Windows 7 will reach end-of-life status, putting many...
General | October 15, 2018Halloween NCSAM contest for IT security experts!With Halloween fast approaching, the search for the scariest costumes is underway. But as...
Identity and access management | October 11, 2018Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1Imagine you're an admin in a company that prides itself on its security practices, which...
Applications Manager | October 10, 2018Next stop: Oracle OpenWorld 2018!The Applications Manager team is all set to attend Oracle OpenWorld 2018. You heard that...