Latest Posts

Five worthy reads: Infrastructure as Code, the single source of truth

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore the concept of Infrastructure as Code.

From server setup and hardware configuration to application deployment, traditional end-to-end …

General 2 min read Read

The Joker’s in town. Time to secure your Android devices

Joker spyware

Security experts from Google have discovered a new spyware in 24 Play Store apps that, combined, have more than 472,000 downloads. Researchers have stated that this spyware also has the capabilities of normal malware and appears to have infected certain …

Desktop Central 2 min read Read

Patch Connect Plus goes one step further with new Application Management and Admin Tools

Redefine SCCM patching with Patch Connect Plus' Application Management and Admin Tools

Microsoft recently celebrated a significant milestone, as System Center Configuration Manager (SCCM) now manages 175 million devices across the globe. This is indeed a great achievement that clearly highlights the reach SCCM has among people managing numerous endpoints. But along …

Patch Connect Plus 2 min read Read

Microsoft Patch Tuesday September 2019: 79 vulnerabilities fixed

No matter how prepared you are, Patch Tuesday never fails to throw in a surprise.

All supported versions of Windows are affected by two privilege escalation vulnerabilities that have already been exploited in the wild, CVE-2019-1214 and CVE-2019-1215. Since …

Desktop Central 3 min read Read

Announcing our weekly podcast series—subscribe now and start listening

Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can!

We’re thrilled to announce the launch of our weekly podcast series where …

Log360 1 min read Read

Password sync in hybrid Active Directory

On any given day, employees toggle between multiple business-critical applications, both on-premises and cloud-based, requiring them to remember different passwords. This often leads to password fatigue and, subsequently, a surge in password-related help desk calls.

Although IT administrators can manually …

ADSelfService Plus 1 min read Read

Combating threats with UEBA: Health is wealth

In this four-part series, Combating threats with UEBA, we explore hypothetical cyberattacks inspired by real-life events in four different industries: healthcare, finance, manufacturing, and education. We’ll take a look at unforeseen security attack scenarios, and discover how user and entity …

Log360 3 min read Read

NTLM vulnerabilities that make you susceptible to relay attacks

In June 2019, Microsoft released patches for two critical vulnerabilities that were discovered in it’s NT LAN Manager (NTLM) protocol suite affecting all versions. These vulnerabilities let attackers execute malicious code on any Windows machine remotely, or even authenticate to …

ADAudit Plus 2 min read Read

Must-have features to recover quickly from accidental deletions in Active Directory

Any IT admin that takes care of the IT infrastructure of a network will know how devastating accidental deletion of objects in Active Directory (AD) can be. No matter how much they try to avoid such incidents, a few cases …

General 2 min read Read