The American Security Today’s annual ‘ASTORS’ Homeland Security Awards Program is a prominent program that highlights advancements in homeland security. This award honors individuals and organizations...

5 limitations of Windows auditing tools and how you can overcome them [Free e-book]
Auditing is essential for addressing security, operational, and compliance needs in a Windows Server environment. However, the built-in Microsoft Windows security auditing tools have certain...

[Webinar] Remote work realities: Hacks, hoodies, and how to safeguard your team
In honor of Computer Security Day on November 30, we’re gearing up for an insightful webinar about safeguarding your remote workforce in today’s digital world....

Make the leap to Exchange Online with seamless migration
As businesses make their transition to the cloud, administrators find themselves with the task of migrating their on-premises Exchange environments to Exchange Online. This migration journey includes multiple...

How to improve risk scoring and threat detection with UEBA [Free e-book]
Did you know that in 2022, the mean time to detect a breach was as many as 207 days? It’s crucial for organizations to detect and...
Your MFA playbook: Crack-proofing your accounts
In recent times, with the pandemic and the rapid advancement of technology, data and jobs have become more digitized than ever. Though this has opened doors...
Windows Defender Firewall misconfigurations and GPOs: Connecting the dots
Many enterprises have a variety of aspects that make up their networks, like Windows Defender Firewall, GPOs, and an AD infrastructure. Vulnerabilities in any part of...

The Windows LDAP bind security vulnerability you should know about
The Lightweight Directory Access Protocol (LDAP) is used by directory clients to access data held by directory servers. Clients and applications authenticate with Windows Active...