SQL Server, Part 2: Authentication and authorization mechanisms in SQL Server, simplified

In the previous blog of this series, we discussed how monitoring SQL Server activities helps secure databases. The database security can further be reinforced by carefully configuring the authentication and authorization mechanisms for database accesses. In this...

General 2 min read Read

Five worthy reads: Implementing a successful remote work environment

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we delve into how...

General 2 min read Read

COVID-19 sets the stage for cyberattacks: How to protect your business while working remotely

  Businesses are shifting their operations to a remote work model in the midst of the COVID-19 lockdown. While this enables business to generally continue...

General 4 min read Read

Five worthy reads: Keeping a close eye on cybersecurity while working remotely

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we highlight the importance of...

General 3 min read Read

Security tips for work-from-home organizations [Webinar]

Many organizations including Google, Amazon, Zoho, and Twitter have adopted remote working due to the recent COVID-19 pandemic. To be safe and to practice social...

General 2 min read Read

File shadowing: The key to a swift recovery from USB and file-based attacks

USB devices are undeniably valuable, but they can be dangerous. On one hand, they are useful in transporting enterprise-critical data, but on the other, they can wreak havoc if misplaced, corrupted due...

General 2 min read Read

COVID-19: Remote patch management struggles and solutions to secure remote users

Crisis or not, keeping endpoints patched against known and emerging vulnerabilities remains one of the top challenges IT admins face. With the new work-from-home norm in response to COVID-19, patch...

General 4 min read Read

Best practices to ensure data security while working remotely

Coronavirus has disrupted daily life for so many around the world in a shockingly short span of time. Lifestyles have shifted. A new normal, albeit...

General 3 min read Read

Introducing our free Secure Remote Access Toolkit for IT teams

The global corporate landscape is on the brink of a complete premises lockdown in light of the COVID-19 crisis. Service disruption is inevitable, and enterprises’...

General 3 min read Read