• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Author:Sharon Raj

  • Sharon Raj
    Sharon Raj

    General | January 10, 2023

    CISA publishes SCuBA's security configuration baseline tool for Microsoft 365

    It is a no brainer that cloud adoption has surged exponentially in the last couple of...

    Conti ransomware incapacitates Costa Rica's government: The FBI, CISA, the NSA, and Secret Service recommend mitigation strategies

    General | June 8, 2022

    Conti ransomware incapacitates Costa Rica's government: The FBI, CISA, the NSA, and Secret Service recommend mitigation strategies

    Weeks after President Rodrigo Chaves Robles became Costa Rica's 49th president, he had to...

    The Colonial Pipeline hack uncovered: FBI- and CISA-recommended security measures

    General | October 20, 2021

    The Colonial Pipeline hack uncovered: FBI- and CISA-recommended security measures

    The Colonial Pipeline ransomware attack is potentially one of the worst cyberattacks to...

    Beware of malware attacks: Little-known facts and why they matter

    General | September 3, 2021

    Beware of malware attacks: Little-known facts and why they matter

    Did you know that nearly 560,000 new instances of malware are detected every day? As...

    Malware alert: The RedXOR and Mamba attacks and how to defend against them

    General | July 27, 2021

    Malware alert: The RedXOR and Mamba attacks and how to defend against them

    Picture this: It's a normal day of working from homeĀ as usual since the COVID-19 outbreak...