IT Security | July 29, 2020Breach notification requirements of POPIA: The importance of SIEM A crucial aspect of the Protection of Personal Information Act (POPIA) is the notification...
IT Security | July 15, 2020ManageEngine named a 2020 Gartner Peer Insights Customers’ Choice for Security Information and Event Management! We're excited to announce that ManageEngine has been recognized as a Customers’ Choice in...
IT Security | July 14, 2020How to protect your IT infrastructure from a Maze ransomware attack Pitney Bowes, a global package delivery giant, has been hit by a second ransomware attack...
IT Security | July 9, 2020Embracing a holistic approach to privileged access security [Expert-led webinar] If there's one silver lining to the COVID-19 pandemic, it’s that the importance of IT...
IT Security | July 7, 2020Telecommunications giant reveals an Active Directory server breach. What can we learn from it? We've always been vocal about the imminent threat of breaches and propagated the message...
IT Security | June 3, 2020Securing Azure Active Directory from PowerShell abuse Malware attacks are evolving and once common tactics are becoming a thing of the past....
IT Security | May 14, 2020Email, security, and breaches Email-based attacks can take many forms, and are typically deployed by cybercriminals in...
IT Security | April 23, 2020Hardening Windows security: How to secure your organization—Part 3 This is the final blog of our three-part blog series on living-off-the-land (LOTL) attacks...
IT Security | April 22, 2020Breaking down the San Francisco airport hack On April 7, 2020, the San Francisco International Airport (SFO) released a notice...
IT Security | April 16, 2020Hardening Windows security: How to secure your organization—Part 2 We're back with part two of our three-part blog series on living-off-the-land attacks. If...
IT Security | April 13, 2020Cybersecurity challenges of the work-from-home model Just recently, the World Health Organization declared coronavirus a global pandemic. This...
IT Security | April 8, 2020IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck] The definition of an “attack” is changing. The level of complexity and technical expertise...