Active Directory (AD) was introduced to the IT world in the mid-1990s, and it has come a long way since then, undergoing several stages of...
Microsoft Patch Tuesday August 2019: WannaCry-level “wormable” flaws patched
No matter how prepared you are, Patch Tuesday never fails to throw in a surprise. With the Microsoft Security Response Center’s warning note, “August 2019 Security Update includes...
Five worthy reads: Threat intelligence—the key to proactive cybersecurity
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore how cyber...
Five worthy reads: Is your enterprise dealing with data sprawl properly?
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we define what data...
Five worthy reads: Educating the education sector on cybersecurity
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss the state of...
Top three reasons passwords are here to stay as the primary form of authentication
Yahoo and cell phone companies like Samsung wanted to kill passwords in 2005 and 2014 respectively, yet in 2019 most of us are still logging on...
The why and how of browser security
The internet has reshaped the workplace, and internet browsers have become an indispensible tool for today’s workforce. Browsers have also become the weak link that...
Five worthy reads: Should NoOps be your new operations strategy?
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss whether NoOps...
Boost your organization’s productivity with these 5 password management techniques
For some time now, many organizations have claimed they’d go password-less. Even tech giants like Google and Microsoft want to kill passwords. Yet, almost two decades later, passwords remain the primary form of authentication in Gmail,...