ADAudit Plus | September 6, 2019NTLM vulnerabilities that make you susceptible to relay attacks In June 2019, Microsoft released patches for two critical vulnerabilities that were...
Log360 | August 20, 2019Keeping up with compliance regulations like the GDPR and CCPA - Free webinar The EU's GDPR and California's CCPA are two of the world’s most prominent data regulations...
Log360 | August 12, 2019Zooming in on UEBA: Answering the "what" and the "how" What is UEBA? User and entity behavior analytics (UEBA) is a relatively new category of...
ADAudit Plus | August 8, 2019Find out which of your employees pose the greatest security risk Among the different types of cyberattacks, insider threats are the hardest to track and...
Security Information and Event Management | August 6, 2019Five events you should be alerted about in your network "What types of events in my network are indications of an attack?" This is a question many...
Log360 | August 5, 2019User and entity behavior analytics: The intelligent guardian of your business Identities are easy to fake, but not actions. Closely monitoring the behavior of a person...
Log360 | August 1, 2019Dealing with three pathbreaking scenarios under the CCPA The "right to be forgotten" is one of the new rights consumers will have under the CCPA. ...
Log360 | July 22, 2019Five reasons to choose Log360, part 5: Integrated compliance management So far in this blog series, we've seen how Log360 is simple to get up and running, allows...
ADAudit Plus | July 17, 2019Detecting first time processes on member servers to protect against attacks In a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities...
Log360 | July 15, 2019Five reasons to choose Log360, part 4: Advanced security features Part two and part three of this blog series gave a detailed look at Log360's in-depth...
Log360 | July 8, 2019Five reasons to choose Log360, part 3: Comprehensive network auditing In the previous post, we discussed the various environments that Log360 helps you audit...
ADAudit Plus | July 4, 2019Monitoring user logon activity to identify compromised accounts In a previous blog, we saw how ADAudit Plus' user behavior analytics (UBA) capabilities...