3 reasons SMBs are more vulnerable to cyberattacks than large enterprises

Details about cyberattacks on small-and-medium-sized businesses (SMBs) may not make it to the headlines, but numerous industry reports and surveys have highlighted the grim reality of the SMB cybersecurity landscape. Even before the COVID-19 pandemic, SMBs were largely targeted …

AD360 3 min read Read

Operation panopticon: How a weak IAM strategy led to the security camera hack across organizations

On March 9, 2021, Verkada, a software company that specializes in making security cameras for monitoring physical access control, was subject to a security hack.

Hackers gained access to the video feed of at least 15 thousand cameras deployed across …

AD360 3 min read Read

The NIST Cybersecurity Framework: 5 core functions and how to align with them using AD360

The Cybersecurity Framework (CSF) was developed by the National Institute of Standards and Technology (NIST), a division of the U.S. Department of Commerce.

This framework was created through collaboration between various private-sector and government experts to provide high-level taxonomy of …

AD360 1 min read Read

Permissions, access rights, and privileges: Active Directory and Azure Active Directory

Permissions, access controls, user rights, or privileges define what an identity can see or do in an organization. These terms are often used interchangeably based on context, and essentially perform the same function—granting or denying access to the resources in …

AD360 5 min read Read

Why Zero Trust in IAM is the new way forward

Zero Trust

The increasing adoption of cloud applications and an expanding remote workforce are redefining network security. In a traditional setting, the emphasis was on perimeter-based security—assuming that everything behind the corporate firewall is safe. However, it’s clear that organizations have to …

AD360 2 min read Read

Monitor employee productivity and analyze user behavior

Register here for a free, 60-day license

The current sudden and forced work-from-home (WFH) situation has caught many organizations unawares. In fact, many are unprepared or underprepared when it comes to arming themselves with the right tools for a remote …

AD360 2 min read Read

Monitor, manage, and secure Office 365 remotely

Register here for a free, 60-day license

Businesses around the world have been forced to adopt remote working policies in response to the COVID-19 outbreak. In just two months, a vast number of employees around the world shifted to a …

AD360 2 min read Read

Cyber-hygiene 101 during remote working: Protecting your digital identities with multi-factor authentication

Register here for a free, 60-day license

When organizations shift to a work-from-home environment, identity and access management (IAM) takes center stage. Organizations with remote workforces must fortify their IAM policies and tools for a better user experience to ensure …

AD360 2 min read Read

Why this crisis-triggered remote-work environment is a hotbed for accidental insider threats

| Register here to receive a free, 60-day license for AD360

Accidental insider threats, more than other threats, were the major concern for 54 percent of the IT leaders surveyed, revealed the 15th annual Global Encryption Trends Study. Even …

AD360 2 min read Read