Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about...
[Infographic] Interested in learning more about the trends and challenges in digital transformation? Jump in!
No matter the year, season, month, or day, network downtime, data loss, and a lack of visibility over your network can make you feel stressed....
Overcome your virtual machine monitoring woes with OpManager
As enterprises move towards a digital-first strategy, they rely much more on their IT infrastructures. An organization’s infrastructure drives the entire business and thus must...
Great Power(Shell) doesn’t always come with great responsibility: Sometimes, SIEM is all you need
Fileless threats are on the rise. These threats occur when cybercriminals use pre-existing software in victims’ systems to carry out attacks, instead of using a...
Safeguard your Active Directory using MITRE ATT&CK techniques
Active Directory (AD) handles sensitive organization data like user credentials, personal information of employees, security permissions, and more. Because of this, AD is prone to...
Are you fishing for tips to thwart phishing scams?
“You’ve inherited a fortune. To transfer the money, I need your bank account credentials.” If you have ever stumbled across something like this, you need...
How to improve the employee experience while ensuring identity security
Employees in the post-lockdown world have bid goodbye to traditional work environments. Remote and hybrid work is the new normal, with employees expecting full access...
How not to become a corporate account takeover victim 101
Account takeover is an attack where cybercriminals take ownership of user accounts using stolen credentials. It is essentially an identity theft fraud where the hacker,...
Password attacks: How to combat them
“Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months.” – Clifford Stoll, Astronomer and...