Log360 | February 26, 2025IT Security Under Attack: The ultimate playbook to counter cyberthreats An employee checks their inbox and notices an email from HR with a worrying subject line...
AD360 | November 11, 2024Active Directory security: Exploiting certificate services Active Directory (AD) is crucial for an organization's identity and access management...
Log360 | June 21, 2021The role of endpoints in the security of your network Endpoint security is a hot topic of discussion, especially now with so many businesses...
Log360 | May 24, 2021Building a complete network security checklist Understanding what to audit in a network can be chaotic and confusing. Building a complete...
AD360 | April 16, 2021Operation panopticon: How a weak IAM strategy led to the security camera hack across organizations On March 9, 2021, Verkada, a software company that specializes in making security cameras...
Log360 | March 30, 2021Azure security 101: Security essentials, logs, authentication, and more “Where necessity speaks, it demands”. This old saying seems particularly apt right now...
Log360 | March 10, 2021Ransomware in 2021: What has changed? Detection and mitigation strategy A ransomware attack is a bug that we can't shake off. Or perhaps, it can even be called a...
Log360 | February 18, 2021Dangerous defaults that put your IT environment at risk: IT security under attack In this blog in the “IT security under attack” series, we wanted to shed some light on an...
Log360 | January 21, 2021IT security under attack: Credential dumping attacks in Windows environments Most of the time, threat actors in the cybersecurity landscape don't employ advanced...
Log360 | December 18, 2020IT security under attack: Why are group memberships so crucial? Security groups either make or break your IT security. Group memberships are responsible...
Log360 | December 8, 2020IT security under attack: A typical day in the life of an IT admin or security analyst The job of IT admins and IT security analysts are, without a doubt, some of the most...
Log360 | November 24, 2020IT security under attack blog series: Instant domain persistence by registering a rogue domain controller In this blog in the IT security under attack series, we will learn about an advanced...