In an IT environment, audit reports need to be generated to meet various security and compliance requirements. Our ROI calculator helps organizations estimate their potential...
How ADAudit Plus helps you assess your exposure to Follina (CVE-2022-30190)
The recently discovered Windows zero-day vulnerability continues to make news as threat actors across the globe are relentless in their efforts to exploit it. The vulnerability,...
ADAudit Plus’ year in review
2021 has been a feature-packed year for ADAudit Plus. Having rolled out an array of new auditing capabilities, features, and enhancements, ADAudit Plus has continued...
What causes repeated account lockouts and how to resolve them
A stringent account lockout policy is vital to derail password guessing and brute-force attacks but it also runs the risk of locking out legitimate users...
Windows logon auditing: Everything you need to know in only 10 minutes [Free e-book]
User logon activity needs to be audited to meet various security, operational, and compliance requirements of an IT environment, such as: Detecting suspicious activities like...
The LLMNR/NBT-NS strike
Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are two protocols that are used to identify a host address on a network when...
IT security: Keep calm and monitor PowerShell
In our last release of the PowerShell security series, we talked about how PowerShell could be leveraged by malicious actors to gain unprecedented access to your organization’s...
Is your business PCI DSS compliant?
How Chooseus Life Insurance lost its customers’ cardholder details and their trust In August 2019, reporters began flocking to Chooseus Life Insurance’s head office in...
NTLM vulnerabilities that make you susceptible to relay attacks
In June 2019, Microsoft released patches for two critical vulnerabilities that were discovered in its NT LAN Manager (NTLM) protocol suite affecting all versions. These...