Reinventing cybersecurity with a multi-layered approach

The complexity of cybersecurity threats has increased over the years. Additionally, the number of attack surfaces that can be used by cybercriminals has expanded phenomenally...

AD360 3 min read Read

3 must-dos for IT admins in healthcare organizations to secure patients’ data and privacy

Since the beginning of the pandemic, there has been an increase in the volume of sensitive patient data being stored and processed by healthcare organizations....

AD360 2 min read Read

Ransomware: How attackers weaponize Active Directory, and what defense measures can stop them [Free e-book]

Ransomware attacks continue to rattle organizations across the globe. Especially worrisome is the fact that many of them are exploiting Active Directory (AD), a crucial...

AD360 2 min read Read

3 reasons SMBs are more vulnerable to cyberattacks than large enterprises

Details about cyberattacks on small-and-medium-sized businesses (SMBs) may not make it to the headlines, but numerous industry reports and surveys have highlighted the grim reality...

AD360 3 min read Read

Operation panopticon: How a weak IAM strategy led to the security camera hack across organizations

On March 9, 2021, Verkada, a software company that specializes in making security cameras for monitoring physical access control, was subject to a security hack....

AD360 3 min read Read

The NIST Cybersecurity Framework: 5 core functions and how to align with them using AD360

The Cybersecurity Framework (CSF) was developed by the National Institute of Standards and Technology (NIST), a division of the U.S. Department of Commerce. This framework was...

AD360 1 min read Read

Permissions, access rights, and privileges: Active Directory and Azure Active Directory

Permissions, access controls, user rights, or privileges define what an identity can see or do in an organization. These terms are often used interchangeably based...

AD360 5 min read Read

Why Zero Trust in IAM is the new way forward

The increasing adoption of cloud applications and an expanding remote workforce are redefining network security. In a traditional setting, the emphasis was on perimeter-based security—assuming that everything behind...

AD360 2 min read Read

Monitor employee productivity and analyze user behavior

Register here for a free, 60-day license The current sudden and forced work-from-home (WFH) situation has caught many organizations unawares. In fact, many are unprepared or underprepared...

AD360 2 min read Read