Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we delve into the increasing...
Mitigating insider threats with user behavior analytics [Free webinar]
Keeping threats at bay and safeguarding the network is every IT administrator’s primary concern. However, it’s usually easier said than done. With traditional auditing...
#MEtheNorth: Here’s how our User Conference can help you stay on top of your IT game
The Raptors winning the NBA title may not be the only big thing to hit Canada in 2019. In two weeks, we’ll kick off our...
There’s more than one way to get admin privileges
Active Directory (AD) was introduced to the IT world in the mid-1990s, and it has come a long way since then, undergoing several stages of...
Microsoft Patch Tuesday August 2019: WannaCry-level “wormable” flaws patched
No matter how prepared you are, Patch Tuesday never fails to throw in a surprise. With the Microsoft Security Response Center’s warning note, “August 2019 Security Update includes...
Five worthy reads: Is your enterprise dealing with data sprawl properly?
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we define what data...
Top three reasons passwords are here to stay as the primary form of authentication
Yahoo and cell phone companies like Samsung wanted to kill passwords in 2005 and 2014 respectively, yet in 2019 most of us are still logging on...
The why and how of browser security
The internet has reshaped the workplace, and internet browsers have become an indispensible tool for today’s workforce. Browsers have also become the weak link that...
Five worthy reads: Should NoOps be your new operations strategy?
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss whether NoOps...