IT Security | April 13, 2020Cybersecurity challenges of the work-from-home model Just recently, the World Health Organization declared coronavirus a global pandemic. This...
General | April 10, 2020Five worthy reads: Keeping a close eye on cybersecurity while working remotely Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
IT operations management and observability | April 10, 2020Monitoring critical business applications while working remotely With a huge number of employees around the globe working remotely during the COVID-19...
Applications Manager | April 10, 2020How to effectively manage your AWS costs Often, when companies are new to Amazon Web Services (AWS), they aren't focused much on...
Security Information and Event Management | April 9, 2020Hardening Windows security: How to secure your organization—Part 1 The cybersecurity threat landscape is quickly changing. Administrators have become more...
Log360 | April 9, 2020SQL Server, Part 1: Why you should monitor SQL logs Over 44 records are stolen per second every day due to data breaches, and according to the...
General | April 9, 2020Security tips for work-from-home organizations [Webinar] Many organizations including Google, Amazon, Zoho, and Twitter have adopted remote...
IT Security | April 8, 2020IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck] The definition of an “attack” is changing. The level of complexity and technical expertise...
General | April 8, 2020File shadowing: The key to a swift recovery from USB and file-based attacks USB devices are undeniably valuable, but they can be dangerous. On one hand, they are...
IT operations management and observability | April 7, 2020Ensuring your web applications offer an ideal user experience while working from home While the recent pandemic has removed much of the traffic from the roads, it has led to an...
General | April 6, 2020COVID-19: Remote patch management struggles and solutions to secure remote users Crisis or not, keeping endpoints patched against known and emerging vulnerabilities...
General | April 2, 2020Best practices to ensure data security while working remotely Coronavirus has disrupted daily life for so many around the world in a shockingly short...