General | May 13, 2020Cybersecurity use cases for better remote workforce management [caption id="attachment_61197" align="aligncenter" width="1194"] Credits- Illustrator: S...
General | May 8, 2020Five worthy reads: Multiexperience: The next milestone in the digital transformation curve Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | May 5, 20205 major risks that impact vulnerable network devices Working from home has become our new normal, with many of our jobs being performed...
General | April 29, 2020How to overcome network challenges while working remotely [Webinar] COVID-19 has had a ripple effect on organizations, forcing them to accommodate a...
General | April 23, 2020Managing VPN connections will help businesses face today's adversity as well as prepare for tomorrow's opportunity The onslaught of the novel COVID-19 has caught businesses off guard, sending many of...
General | April 21, 2020SQL Server, Part 2: Authentication and authorization mechanisms in SQL Server, simplified In the previous blog of this series, we discussed how monitoring SQL Server activities...
General | April 17, 2020Five worthy reads: Implementing a successful remote work environment [caption id="attachment_60443" align="alignnone" width="1194"] Illustration by...
General | April 15, 2020COVID-19 sets the stage for cyberattacks: How to protect your business while working remotely Businesses are shifting their operations to a remote work model in the midst of the...
General | April 15, 2020Patch Tuesday April 2020 comes with fixes for 4 zero-days and 15 critical vulnerabilities The second Tuesday of the month is upon us, and this translates to only one thing in the...
General | April 10, 2020Five worthy reads: Keeping a close eye on cybersecurity while working remotely Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | April 9, 2020Security tips for work-from-home organizations [Webinar] Many organizations including Google, Amazon, Zoho, and Twitter have adopted remote...
General | April 8, 2020File shadowing: The key to a swift recovery from USB and file-based attacks USB devices are undeniably valuable, but they can be dangerous. On one hand, they are...