One of the lasting changes brought about by the COVID-19 pandemic is that it forced organizations to rethink the concept of a workspace. As remote...
Five ways to hack MFA, and the FBI’s mitigation strategy [E-book]
Advances in technology have led to the creation of multiple data security methods that help organizations secure sensitive data from the prying hands of attackers....

CISA’s recommendations to recognize and avoid email scams [E-book]
Email has always been a popular tool for business communications. Unfortunately, it is also one of the weakest links in an organization’s security strategy. 94...
Avert cyberattacks against MFA using FBI-recommended countermeasures [Webinar]
With the rise of remote work, multi-factor authentication (MFA) has become more essential than ever. MFA can be used to protect authentications happening on different resources...

3 simple ways to drastically reduce Active Directory administration costs [E-book]
Any Active Directory (AD) administrator knows that managing AD using just native tools is a chore. To make matters worse, today’s IT environments are more...
IT security under attack blog series: Instant domain persistence by registering a rogue domain controller
In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain...
Free for unlimited users: Password Expiration Notifier for Active Directory
Changing your password periodically is vital and helps prevent hackers from accessing your network resources and inflicting damage. If users fail to change their passwords...

CISO’s guide to building an ironclad data loss prevention strategy [E-book]
“The Global Datasphere will grow from 45 Zettabytes (ZB) in 2019 to 175ZB by 2025.” – International Data Corporation (IDC) As data proliferates, traditional data...