The why and how of browser security

The internet has reshaped the workplace, and internet browsers have become an indispensible tool for today’s workforce. Browsers have also become the weak link that...

General 3 min read Read

Five worthy reads: Should NoOps be your new operations strategy?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss whether NoOps...

General 3 min read Read

Boost your organization’s productivity with these 5 password management techniques

For some time now, many organizations have claimed they’d go password-less. Even tech giants like Google and Microsoft want to kill passwords. Yet, almost two decades later, passwords remain the primary form of authentication in Gmail,...

General 2 min read Read

SSO for cloud apps in hybrid Active Directory

Single sign-on (SSO) in Azure Active Directory (AD) allows users to easily and securely sign on to cloud applications using their Azure account credentials. Without SSO, administrators need to create and...

General 1 min read Read

India, our Cybersecurity and Hybrid Identity Management seminars are heading your way

The Indian leg of our Cybersecurity and Hybrid Identity Management seminar series is all set to take place in four cities this June and July. Join our...

General 1 min read Read

[Infographic] Still manually onboarding users into Active Directory? There’s a better way!

In our previous blog post, we had touched upon the top three password related issues that plague IT admins. In this blog, we will take a...

General 2 min read Read

Five worthy reads: Smart Spaces—for smart work or smart theft?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we’ll talk about Smart...

General 3 min read Read

The IT admin’s worst nightmare: Stolen passwords [Webinar]

Passwords are the virtual keys that protect an organization’s network resources and user accounts from unauthorized intrusions. As such, it’s unsurprising that passwords are major targets for cybercriminals. However, users create weak...

General 2 min read Read