IT Security | July 12, 2017Log management and SIEM fundamentals: Searching through logs and responding to incidents Understanding what happened in a security incident and trying to analyze the root cause of...
Unified endpoint management and security | July 11, 2017ServiceNow+Desktop Central: Integration that delivers better IT services Just imagine how efficient your ServiceNow help desk would be if it could do more than...
AlarmsOne | July 10, 2017Create custom views and tag your alerts to keep an eye on high-priority incidents Overwhelmed with too many applications and too many alerts? Don't worry. With AlarmsOne's...
Endpoint Central | July 7, 2017Stressed about Delta Charlie malware? Desktop Central has you covered Vulnerability threats are any IT administrator's worst nightmare. Recently, following the...
Identity and access management | July 6, 2017[Free Webinar] Awesome Active Directory password controls Active Directory passwords are easy to crack. Since the password controls have not changed...
Endpoint Central | July 5, 2017WannaCry: Battle with the shadow "There are two kinds of people in America today: those who have experienced a foreign...
IT Security | July 4, 2017Log management and SIEM fundamentals: Mitigating security threats In parts 1 and 2 of this blog series, we went over SIEM and its role in performing a...
IT Security | July 3, 2017Protecting against Petya and other ransomware As a security professional, which do you fear more: 1) explaining to your boss or CEO that...
Endpoint Central | June 30, 2017WannaCry again? Meet Adylkuzz, its sneaky cryptocurrency mining sibling More than 400,000 computers wrldwide have been infected with WannaCry ransomware since...
Identity and access management | June 29, 2017Get notified when a folder is shared on servers and workstations We all know that sharing a folder on a server opens up an entry point to that server. Even...
IT Security | June 28, 2017Log management and SIEM fundamentals: Comprehensive log collection and auditing The first step in SIEM is collecting log data. Log data, as we saw in part 1, is what...
Endpoint Central | June 26, 2017If you think WannaCry is huge, wait for EternalRocks! While the world was responding to the WannaCry attack—which only utilized the EternalBlue...