Firewall Analyzer | April 22, 2020VPN 101: Streamline operations and ensure business continuity with the right VPN [ Free e-book ] In the ever-evolving business landscape, remote work has become the new normal in light...
Log360 | April 21, 2020The Monopoly Man takes on privacy, data breaches, and more [Podcast series] In the second and final episode of our Expert Tech Talk podcast series, Ian Madrigal,...
IT Security | April 16, 2020Hardening Windows security: How to secure your organization—Part 2 We're back with part two of our three-part blog series on living-off-the-land attacks. If...
Firewall Analyzer | April 16, 2020Working from home? Be sure to follow these security best practices [Free e-book] Until now, a majority of enterprises and their employees have been safely protected by...
Log360 | April 14, 2020The Monopoly Man features in our first-ever Expert Tech Talk podcast series. Listen now! We are pleased to launch our first-ever Expert Tech Talk podcast series featuring...
IT Security | April 13, 2020Cybersecurity challenges of the work-from-home model Just recently, the World Health Organization declared coronavirus a global pandemic. This...
Security Information and Event Management | April 9, 2020Hardening Windows security: How to secure your organization—Part 1 The cybersecurity threat landscape is quickly changing. Administrators have become more...
Log360 | April 9, 2020SQL Server, Part 1: Why you should monitor SQL logs Over 44 records are stolen per second every day due to data breaches, and according to the...
IT Security | April 8, 2020IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck] The definition of an “attack” is changing. The level of complexity and technical expertise...
IT Security | April 1, 2020The rise in cyberattacks surrounding the COVID-19 pandemic Fear, uncertainty, and doubt are powerful emotions, and time and again, hackers attempt to...
Firewall Analyzer | March 30, 2020How VPN bandwidth monitoring helps retain remote workforce productivity The COVID-19 outbreak has brought businesses around the globe to their knees. To survive...
Log360 | March 23, 2020Why log archival is important for network security Network devices like workstations, servers, routers, and firewalls generate a large volume...