• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Author:abhilash.mamidela@zohocorp.com

  • abhilash.mamidela@zohocorp.com
    abhilash.mamidela@zohocorp.com

    Security Information and Event Management | April 9, 2020

    Hardening Windows security: How to secure your organization—Part 1

    The cybersecurity threat landscape is quickly changing. Administrators have become more...

    IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck]

    IT Security | April 8, 2020

    IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck]

    The definition of an “attack” is changing. The level of complexity and technical expertise...

    IT security: Keep calm and monitor PowerShell 

    ADAudit Plus | February 27, 2020

    IT security: Keep calm and monitor PowerShell 

    In our last release of the PowerShell security series, we talked about how PowerShell...

    IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance 

    IT Security | February 3, 2020

    IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance 

    Cyberattacks are a growing threat, and organizations are investing time and money in...

    IT security: PowerShell as a cyberattack tool 

    IT Security | January 10, 2020

    IT security: PowerShell as a cyberattack tool 

    Tools and features introduced with the intention of benefiting and empowering an...

    There's more than one way to get admin privileges

    General | August 22, 2019

    There's more than one way to get admin privileges

    Active Directory (AD) was introduced to the IT world in the mid-1990s, and it has come a...

    Page 3 of 3«123