Log360 | March 3, 2022Anomaly Detection In Cybersecurity For Dummies [E-book] If you are a cybersecurity professional, you must be aware that cyberattacks, especially...
DataSecurity Plus | February 24, 2022Is your sensitive data overexposed? 76% of IT security leaders experienced data breaches involving the loss or theft of...
Security Information and Event Management | January 27, 2022Data Privacy Day, Part 1: What you need to know about data privacy Data Privacy Day (known in Europe as Data Protection Day) is an international event aimed...
Security Information and Event Management | January 21, 2022Saudi Aramco data breach: A reminder to start monitoring RPIs On June 23, 2021, threat actors reported that they had stolen a terabyte of data from...
Log360 | December 7, 2021[Free online guide] Critical Windows event IDs and security use cases to monitor According to Statcounter, 75.18% of servers across the globe use a Windows operating...
ADAudit Plus | November 26, 2021ADAudit Plus' year in review 2021 has been a feature-packed year for ADAudit Plus. Having rolled out an array of new...
DataSecurity Plus | November 11, 2021Bring down data storage costs by getting rid of obsolete data [Savings estimator] Redundant, obsolete, and trivial (ROT) data refers to information housed in data...
ADAudit Plus | November 3, 2021What causes repeated account lockouts and how to resolve them A stringent account lockout policy is vital to derail password guessing and brute-force...
Log360 | October 29, 202113 spooky security threats that happened in 2021 Alan is one of the senior officers of a financial bank in Texas. Alan was looking to buy a...
Security Information and Event Management | October 14, 2021Watch out for tenants living off your land The cyberworld has witnessed and defended against several forms of attacks. Some of the...
Log360 | September 9, 2021How Kaseya fell victim to a ransomware attack On July 2, 2021, the cybersecurity world woke up to yet another ransomware attack—this...
DataSecurity Plus | June 28, 2021Why companies need URL filtering for enhanced cloud protection The cloud landscape is rife with unsafe URLs and inappropriate content. This—coupled with...