Integrate certificate life cycle management with enterprise MDM and boost your mobile ecosystem security

A huge portion of today’s corporate network is made up of mobile endpoints, such as laptops, tablet computers, and mobile phones. These are domain-joined and...

Key Manager Plus 3 min read Read

Is Germany’s official COVID-19 contact tracing app more viral than the virus?

The COVID-19 pandemic forced several governments across the world to restrict civil liberties and movements. However, with new technologies such as contact tracing apps to aid...

IT Security 2 min read Read

How to secure your network from a Ryuk ransomware attack

Universal Health Services (UHS), a Fortune 500 company and healthcare services provider, has reportedly shut down systems at facilities throughout the United States after the Ryuk...

IT Security 4 min read Read

5 user behavioral patterns to look out for in a decentralized workspace

Problem: If there are thousands of employees scattered around hundreds of places, how do you keep your organization’s network safe? Solution: You should monitor your...

IT Security 2 min read Read

Advanced Active Directory attacks: Simulating domain controller behavior

There was a time when cyberattacks on identity and authentication infrastructures [like Active Directory (AD)] were immensely challenging to perform. A lot of forethought had...

IT Security 3 min read Read

Are you listening to your logs? Part 4: Open ports

Did you know that an organization with more open ports is more vulnerable to data breaches?  In the first, second, and third parts of the...

IT Security 3 min read Read

Are you listening to your logs? Part 3: High disk usage

In the previous blog of this series, we saw how server crashes can be avoided by detecting low disk space in time using logs. In this...

IT Security 2 min read Read

Are you listening to your logs? Part 2: Low disk space

In the first part of this blog series, we saw how monitoring slow server response times in your network can help detect denial-of-service (DoS) attacks....

IT Security 2 min read Read

Are you listening to your logs? Part 1: Slow server response

Loading… Is there a more uninspiring word to encounter while browsing the internet? When a loading screen occurs, statistics show it takes only three seconds for...

IT Security 2 min read Read