In the previous blog in this series, we discussed authentication and authorization mechanisms, and how configuring them properly can help secure your databases. In this blog, we’ll talk about how data...
Hardening Windows security: How to secure your organization—Part 3
This is the final blog of our three-part blog series on living-off-the-land (LOTL) attacks. If you missed last week’s blog, you can read it here. LOTL attacks are...
Breaking down the San Francisco airport hack
On April 7, 2020, the San Francisco International Airport (SFO) released a notice confirming that two of its websites, SFOConnect.com and SFOConstruction.com, were targets of a cyberattack in March 2020. The attack...
Hardening Windows security: How to secure your organization—Part 2
We’re back with part two of our three-part blog series on living-off-the-land attacks. If you missed part one, you can read it here. In a nutshell, living-off-the-land (LOTL) refers to a type of attack where...
Cybersecurity challenges of the work-from-home model
Just recently, the World Health Organization declared coronavirus a global pandemic. This decision brought with it several health and safety measures, and normal life came to a...
Hardening Windows security: How to secure your organization—Part 1
The cybersecurity threat landscape is quickly changing. Administrators have become more cautious when it comes to security and governing access, end users have become tech-savvy...
IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck]
The definition of an “attack” is changing. The level of complexity and technical expertise needed to perform an attack has been simplified because the features that are...
The rise in cyberattacks surrounding the COVID-19 pandemic
Fear, uncertainty, and doubt are powerful emotions, and time and again, hackers attempt to leverage these for their own gain. As the coronavirus develops into...
ManageEngine named in Gartner’s Magic Quadrant for Security Information and Event Management four years running!
The cybersecurity market is ever-changing and primarily driven by sophisticated cyberattacks, disruptive technological growth, and stringent data protection regulations like the GDPR and CCPA. We...