Collin’s dictionary defines “behavior pattern” as a recurrent way of acting by an individual or group toward a given object or in a given situation....

10 essential cybersecurity tips for beginners
Organizations today are challenged by an increased exposure to cyber threats. Attackers often target emerging technologies since the new technology is often ill-equipped to handle an...

Integrate certificate life cycle management with enterprise MDM and boost your mobile ecosystem security
A huge portion of today’s corporate network is made up of mobile endpoints, such as laptops, tablet computers, and mobile phones. These are domain-joined and...

Security operations center, Part 2: Life of a SOC analyst
In the first part of this blog series, we saw a brief overview of what a security operations center (SOC) is and how it operates....
Is Germany’s official COVID-19 contact tracing app more viral than the virus?
The COVID-19 pandemic forced several governments across the world to restrict civil liberties and movements. However, with new technologies such as contact tracing apps to aid...

How to secure your network from a Ryuk ransomware attack
Universal Health Services (UHS), a Fortune 500 company and healthcare services provider, has reportedly shut down systems at facilities throughout the United States after the Ryuk...

5 user behavioral patterns to look out for in a decentralized workspace
Problem: If there are thousands of employees scattered around hundreds of places, how do you keep your organization’s network safe? Solution: You should monitor your...
Advanced Active Directory attacks: Simulating domain controller behavior
There was a time when cyberattacks on identity and authentication infrastructures [like Active Directory (AD)] were immensely challenging to perform. A lot of forethought had...
Are you listening to your logs? Part 4: Open ports
Did you know that an organization with more open ports is more vulnerable to data breaches? In the first, second, and third parts of the...