What is a bigger threat to mankind: nuclear weapons or cybercrime? While most would say nuclear weapons, Warren Buffett says cybercrime would take the cake....
Azure security 101: Security essentials, logs, authentication, and more
“Where necessity speaks, it demands”. This old saying seems particularly apt right now with the pandemic forcing organizations to completely change the way they think...
Windows logon auditing: Everything you need to know in only 10 minutes [Free e-book]
User logon activity needs to be audited to meet various security, operational, and compliance requirements of an IT environment, such as: Detecting suspicious activities like...
Ransomware in 2021: What has changed? Detection and mitigation strategy
A ransomware attack is a bug that we can’t shake off. Or perhaps, it can even be called a shape-shifter that somehow finds a way into...
Security operations center, Part 3: Finding your weakest link
Any organization with data assets is a possible target for an attacker. Hackers use various forms of advanced cyberattack techniques to obtain valuable company data;...
Dangerous defaults that put your IT environment at risk: IT security under attack
In this blog in the “IT security under attack” series, we wanted to shed some light on an unfamiliar and seldom discussed topic in IT security:...
Free Active Directory management tools: Part 5 – Replication, domain controller roles, and monitoring
Replicate information between domain controllers (DCs), identify the roles assigned to the domain controllers in your Active Directory (AD) environment, and monitor your domain controllers...
Free Active Directory management tools: Part 4 – Terminal Session Manager and Last Logon Finder
When your machine throws a “the server has exceeded the maximum number of allowed connections” message or when user accounts go stale, it’s up to...
IT security under attack: Credential dumping attacks in Windows environments
Most of the time, threat actors in the cybersecurity landscape don’t employ advanced techniques and tools to intrude and establish a foothold within networks. Often, they disguise...