Latest Posts

Operation panopticon: How a weak IAM strategy led to the security camera hack across organizations

On March 9, 2021, Verkada, a software company that specializes in making security cameras for monitoring physical access control, was subject to a security hack.

Hackers gained access to the video feed of at least 15 thousand cameras deployed across …

AD360 3 min read Read

Five worthy reads: Location intelligence—the key to next-level data utilization

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore the rising scope of location intelligence in improving the overall customer experience.

The pandemic has pushed businesses …

General 3 min read Read

Microsoft Patch Tuesday April 2021 fixes 108 vulnerabilities, including 5 zero-days

Yet another month, yet another Patch Tuesday. With the never-ending cybersecurity threats brought on by the pandemic, it’s essential to understand the importance of Patch Tuesday releases and find ways to efficiently deploy the new updates to remote endpoints.

This …

Patch Manager Plus 3 min read Read

The road ahead: McKinsey’s top 5 cybersecurity predictions for 2021 and beyond

Blog-banner-1

What is a bigger threat to mankind: nuclear weapons or cybercrime? While most would say nuclear weapons, Warren Buffett says cybercrime would take the cake. If the revenue generated by cybercrime were measured as a country, then cybercrime, which is …

ADSelfService Plus 2 min read Read

Is the cloud coming to all of us?

During the past twenty years, so much has changed in the IT office. Two decades ago, we were still using dial-up modems. Now, the entire world wide web is at our fingertips, and our world of IT is more efficient …

ManageEngine 4 min read Read

Five worthy reads: The unexpected costs following a cyberattack

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the worst data breaches that happened recently, their impact, and the cost of data breaches

General 3 min read Read

Azure security 101: Security essentials, logs, authentication, and more

Where necessity speaks, it demands”. This old saying seems particularly apt right now with the pandemic forcing organizations to completely change the way they think about their IT networks. That rapid shift to remote work has resulted in a …

Log360 2 min read Read

Windows logon auditing: Everything you need to know in only 10 minutes [Free e-book]

Windows logon auditing e-book

User logon activity needs to be audited to meet various security, operational, and compliance requirements of an IT environment, such as:

  • Detecting suspicious activities like a high volume of logon failures.

  • Tracking the active and idle time spent by users

ADAudit Plus 1 min read Read

Unraveling open port threats and enhancing security with port scanning tools

From exposing your network vulnerabilities to becoming a passageway for intruders, open ports can pose several risk vectors that threaten your network’s confidentiality, integrity, and availability. This is why it’s a best practice to close your open ports. To tackle …

OpUtils 6 min read Read