General | August 21, 2024What caused the worldwide BSOD event in 2024 for Windows environments? The blue screen of death (BSOD) triggered on July 19, 2024 in Windows environments...
General | January 10, 2024Security warning! All of us are victims of open-source vulnerabilities Picture this: A user on your network casually explores the internet and scrolls through a...
General | December 1, 2023Wi-Fi security auditing: Vital checks for organizational security Cyberattacks are now more sophisticated than ever. Attackers no longer even need extensive...
Identity and access management | October 19, 2023Windows Defender Firewall misconfigurations and GPOs: Connecting the dots Many enterprises have a variety of aspects that make up their networks, like Windows...
General | August 25, 2023The MOVEit Transfer vulnerability affects 40 million people worldwide In over 600 data breaches, 40 million individuals were affected across the globe due to...
General | August 10, 2023The service account test: 3 questions you must have answers for Service accounts are indispensable in any infrastructure. Some service accounts may be as...
General | May 12, 20234 things to identify and fix in your GPOs Group Policy Objects (GPOs) act as a security layer in your infrastructure. They enforce...
Log360 | May 10, 2023Discover how attackers exploit DNS vulnerabilities in Active Directory A DNS server is an integral part of an AD environment. Simple yet crucial activities are...
General | February 13, 2023Monitoring domain user accounts with elevated access rights Standard users having elevated privileges is never good news. Accounts such as domain...
General | June 17, 2020SQL Server, Part 4: Understanding built-in SQL Server principals In the previous blog in this series, we discussed the principle of least privilege, and...
Security Information and Event Management | May 11, 2020SQL Server, Part 3: Adopting the principle of least privilege In the previous blog in this series, we discussed authentication and authorization...
General | April 21, 2020SQL Server, Part 2: Authentication and authorization mechanisms in SQL Server, simplified In the previous blog of this series, we discussed how monitoring SQL Server activities...