General | July 12, 2022ManageEngine captures the Cyber Defense Global InfoSec Awards 2022 spotlight with 5 top honorsAt the RSA Conference in San Francisco on June 6, Cyber Defense Magazine celebrated the 10th Annual Cyber Defense Global InfoSec Awards. A prestigious...
General | July 11, 2022The roadmap to Zero Trust starts with authentication [Webinar]With companies juggling remote and hybrid workforce models, security teams are facing a new challenge: to...
General | July 8, 2022Five worthy reads: Take note—digital humans are catching upFive worthy reads is a regular column on five noteworthy items we've discovered while researching trending and...
RecoveryManager Plus | July 7, 2022A Microsoft SharePoint Online feature could be the cause of the next ransomware attackMicrosoft SharePoint Online is one of the most widely used content management platforms. Unfortunately,...
Identity and access management | July 6, 2022Kerberos and Active DirectoryIf you have been researching Active Directory (AD), chances are that you will come across...
Security Information and Event Management | July 5, 2022Data Privacy Day, Part 2: Overcoming challenges in securing customer informationIn part 1 of this series, we discussed data privacy, the related laws, and the data...
IT Security | July 4, 2022Clearing the air over the new CERT-In rulesAuthorities that lay down compliance regulations often update them in order to keep them...
General | July 1, 2022Are your credentials safe? Decoding credential phishing attacks Companies have increasingly allowed bring your own device (BYOD) policies to support...
OpManager | June 30, 2022What to look for in a Windows network monitoring toolMonitoring the Windows devices in a network is difficult yet essential since the devices...
AD360 | June 29, 2022How to lower security risks and cyber insurance premiumsThe COVID-19 pandemic has transformed the way we live and work as we continue to rely more...