On March 9, 2021, Verkada, a software company that specializes in making security cameras for monitoring physical access control, was subject to a security hack....
The NIST Cybersecurity Framework: 5 core functions and how to align with them using AD360
The Cybersecurity Framework (CSF) was developed by the National Institute of Standards and Technology (NIST), a division of the U.S. Department of Commerce. This framework was...
Why Zero Trust in IAM is the new way forward
The increasing adoption of cloud applications and an expanding remote workforce are redefining network security. In a traditional setting, the emphasis was on perimeter-based security—assuming that everything behind...
Monitor employee productivity and analyze user behavior
Register here for a free, 60-day license The current sudden and forced work-from-home (WFH) situation has caught many organizations unawares. In fact, many are unprepared or underprepared...
Monitor, manage, and secure Office 365 remotely
Register here for a free, 60-day license Businesses around the world have been forced to adopt remote working policies in response to the COVID-19 outbreak....
Cyber-hygiene 101 during remote working: Protecting your digital identities with multi-factor authentication
Register here for a free, 60-day license When organizations shift to a work-from-home environment, identity and access management (IAM) takes center stage. Organizations with remote...
Why this crisis-triggered remote-work environment is a hotbed for accidental insider threats
| Register here to receive a free, 60-day license for AD360 Accidental insider threats, more than other threats, were the major concern for 54 percent of the IT...