NOBELIUM’s phishing attacks: How to protect your Microsoft 365 setup [E-book]

In 2021, the Microsoft Threat Intelligence Center discovered a new malicious email campaign by NOBELIUM, a group of hackers that has carried out nation-state attacks, and...

M365 Manager Plus 2 min read Read

Protecting your Microsoft 365 services against NOBELIUM attacks [E-book]

In December 2020, Microsoft came forward with details regarding what is now being considered the most extensive, severe cyberattack in history—the NOBELIUM attack. This shocking...

M365 Manager Plus 2 min read Read

The handbook that every cybersecurity analyst needs [E-book]

The IT industry recognizes the drastic increase in cyberattacks in the past few years. With cybercriminals constantly evolving their attack tactics, IT security professionals need...

Log360 2 min read Read

4 golden reasons for equipping your SOC with ManageEngine Log360

Cyberattacks are fast becoming a part of our daily lives. Multiple sources such as Norton Security and Forbes suggest that since the pandemic, attacks are not only...

Log360 5 min read Read

A practical approach to Active Directory Domain Services, Part 2: Active Directory and the Domain Name System

For readers who have returned to this blog after understanding the basics of Active Directory (AD) in part 1 of this series, welcome back! For all...

Active Directory 6 min read Read

A practical approach to Active Directory Domain Services, Part 1: A beginner’s guide to Active Directory

Active Directory Domain Services (AD DS) is the traditional, on-premises domain service offered by Microsoft. It is the core component and a server role in...

Active Directory 5 min read Read

Anomaly Detection In Cybersecurity For Dummies [E-book]

If you are a cybersecurity professional, you must be aware that cyberattacks, especially those that arise from insider threats, are increasing every day. Multiple sources suggest...

Log360 2 min read Read

Is your sensitive data overexposed?

76% of IT security leaders experienced data breaches involving the loss or theft of sensitive information contained in documents or files. – Code42 2021 Data Exposure...

DataSecurity Plus 3 min read Read

Step into the new year with organized and secure IAM

According to Business Insider, 80% of people give up on their new year resolutions within the first 30 days. Don’t let your business and IT...

ADManager Plus 3 min read Read