Search results for: IT Security

Five worthy reads: Navigating the landscape of US IT security laws in the government sector

In an era defined by unprecedented digitalization, the security of information and data holds paramount importance, especially within the government sector. As technology evolves, so...

General 3 min read Read

Dangerous defaults that put your IT environment at risk: IT security under attack

In this blog in the “IT security under attack” series, we wanted to shed some light on an unfamiliar and seldom discussed topic in IT security:...

Log360 5 min read Read

IT security under attack: Credential dumping attacks in Windows environments

Most of the time, threat actors in the cybersecurity landscape don’t employ advanced techniques and tools to intrude and establish a foothold within networks.  Often, they disguise...

Log360 3 min read Read

IT security under attack: Why are group memberships so crucial?

Security groups either make or break your IT security. Group memberships are responsible for administrative access in your your network and define access to other...

Log360 4 min read Read

IT security under attack: A typical day in the life of an IT admin or security analyst

The job of IT admins and IT security analysts are, without a doubt, some of the most important jobs in any company. When things are running smoothly, it is...

Log360 4 min read Read

IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain...

Log360 3 min read Read

Is IT security under attack?

From credential theft to network vulnerability exploitation and ransomware incidents on highly secure organizations, the year 2020 has been surprisingly rough on IT security. In the wake...

Log360 2 min read Read

IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck]

The definition of an “attack” is changing. The level of complexity and technical expertise needed to perform an attack has been simplified because the features that are...

IT Security 2 min read Read

IT security: Keep calm and monitor PowerShell 

In our last release of the PowerShell security series, we talked about how PowerShell could be leveraged by malicious actors to gain unprecedented access to your organization’s...

ADAudit Plus 1 min read Read