• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

AD360 | November 10, 2021

3 must-dos for IT admins in healthcare organizations to secure patients' data and privacy

Since the beginning of the pandemic, there has been an increase in the volume of sensitive...

ADAudit Plus | November 3, 2021

What causes repeated account lockouts and how to resolve them

A stringent account lockout policy is vital to derail password guessing and brute-force...

AD360 | October 28, 2021

Ransomware: How attackers weaponize Active Directory, and what defense measures can stop them [Free e-book]

Ransomware attacks continue to rattle organizations across the globe. Especially worrisome...

Microsoft's shared responsibility model: Who should back up Azure AD and Microsoft 365 data? [E-book]

RecoveryManager Plus | October 21, 2021

Microsoft's shared responsibility model: Who should back up Azure AD and Microsoft 365 data? [E-book]

Use of Azure AD and Microsoft 365 has steadily increased over the past few years, and...

ADManager Plus | October 12, 2021

Enhance ADManager Plus security using the Product Security Hardening feature

Product Security Hardening is an option that has been added to ADManager Plus in version...

[Free e-book] How to protect Microsoft 365 from the NOBELIUM hackers' phishing attack

M365 Manager Plus | October 6, 2021

[Free e-book] How to protect Microsoft 365 from the NOBELIUM hackers' phishing attack

NOBELIUM is the group behind the SUNBURST backdoor, TEARDROP malware, GoldMax malware,...

[Free e-book] The Office of Inspector General's (OIG's) Microsoft 365 audit checklist

M365 Manager Plus | September 23, 2021

[Free e-book] The Office of Inspector General's (OIG's) Microsoft 365 audit checklist

What is the OIG? OIG stands for Office of Inspector General, which is part of the U.S....

ADSelfService Plus | September 17, 2021

How brute-force attacks are spearheading ransomware campaigns

Ransomware groups have been exploiting the switch to remote work unlike any other....

AD360 | September 2, 2021

3 reasons SMBs are more vulnerable to cyberattacks than large enterprises

Details about cyberattacks on small-and-medium-sized businesses (SMBs) may not make it to...

Evolution of privileged access management: Serving modern enterprises' expanding use cases [Expert-led webinar]

PAM360 | June 17, 2021

Evolution of privileged access management: Serving modern enterprises' expanding use cases [Expert-led webinar]

Organizations have long been upgrading their digitization game, and more rigorously so...

The Colonial Pipeline ransomware attack: Lessons for cybersecurity teams

PAM360 | June 15, 2021

The Colonial Pipeline ransomware attack: Lessons for cybersecurity teams

                                      The recent ransomware attack on Colonial Pipeline is...

Operation panopticon: How a weak IAM strategy led to the security camera hack across organizations

AD360 | April 16, 2021

Operation panopticon: How a weak IAM strategy led to the security camera hack across organizations

On March 9, 2021, Verkada, a software company that specializes in making security cameras...

Page 9 of 49« First«...7891011...»Last »