Watch out for tenants living off your land

The cyberworld has witnessed and defended against several forms of attacks. Some of the most common ones known to disrupt a network include credential stealing, malware installations, worms and viruses, and insider threats. In order to execute these attacks successfully, …

IT Security 3 min read Read

 Security operations center, Part 2: Life of a SOC analyst 

In the first part of this blog series, we saw a brief overview of what a security operations center (SOC) is and how it operates. In this part, we’ll take a look at the typical activities that SOC analysts carry …

IT Security 2 min read Read

Are you listening to your logs? Part 4: Open ports

Did you know that an organization with more open ports is more vulnerable to data breaches?

 In the first, second, and third parts of the Are you listening to your logs? series, we saw how logs can be …

IT Security 3 min read Read

Are you listening to your logs? Part 3: High disk usage

In the previous blog of this series, we saw how server crashes can be avoided by detecting low disk space in time using logs. In this blog, we’ll talk about another server metric, disk usage, and how it can be …

IT Security 2 min read Read

Are you listening to your logs? Part 2: Low disk space

In the first part of this blog series, we saw how monitoring slow server response times in your network can help detect denial-of-service (DoS) attacks. In this blog, we look at how logs can detect an operational issue such as …

IT Security 2 min read Read

Are you listening to your logs? Part 1: Slow server response

Loading…

Is there a more uninspiring word to encounter while browsing the internet? When a loading screen occurs, statistics show it takes only three seconds for a potential customer to leave your website.

Are you listening to your logs? is …

IT Security 2 min read Read

Security operations center, Part 1: The guardian of your organization

Hacking is finding a way to accomplish a goal, never accepting no for an answer, and being more persistent and patient than anyone else. – Paul Asadoorian, founder and CTO, Security Weekly.

Hackers arm themselves with the latest technologies, employ …

IT Security 3 min read Read

SQL Server, Part 3: Adopting the principle of least privilege

In the previous blog in this series, we discussed authentication and authorization mechanisms, and how configuring them properly can help secure your databases. In this blog, we’ll talk about how data breaches can be prevented by implementing the principle of …

IT Security 3 min read Read

Hardening Windows security: How to secure your organization—Part 1

The cybersecurity threat landscape is quickly changing. Administrators have become more cautious when it comes to security and governing access, end users have become tech-savvy and security-aware, and attackers have also raised their game.

 Living-off-the-land attacks, or LOTL, is one …

IT Security 2 min read Read