Identity and access management | January 25, 2017Free webinar series: Advance your security and management skills with Derek Melber Over the next few months, you have the opportunity to attend many free and live webinars...
Identity and access management | May 6, 2016Tired of troubleshooting Active Directory? Every Active Directory administrator around the world has the same issue. There is always...
Identity and access management | January 7, 2016Windows Active Directory security hardening: Honeypot #1 To catch an attack and an attacker, both the administrator and the organization need to be...
Identity and access management | December 31, 2015Good-bye 2015: Final week of year tasks for Active Directory As administrators, we are the employees that rarely get to take time off work, as someone...
Identity and access management | December 18, 2015Audit policy settings to track Active Directory changes The ability to track all changes that occur to any objects in Active Directory could...
Identity and access management | September 14, 2015Monitor Files and Folders Like Never Before Over and over, I get the same question from many admins and security professionals...
Identity and access management | November 21, 2014Auditing vs. Monitoring of Active Directory I just finished a class where I had both auditors and administrators in attendance. It...
EventLog Analyzer | January 24, 2014IT Security and Auditing Framework - A Glass Half Full or Half Empty? Log Management, Compliance Reporting and SIEM Corporate islands with no connectivity to...
Password Manager Pro | October 29, 2013PCI-DSS 3.0: The Stress on Password Protection & Security [Part-2] [In the previous post, we briefly discussed the requirements proposed for PCI-DSS 3.0. In...
General | December 4, 2012Can your organization be Hack Immune? This past few months witnessed a record breaking global level of malware threats and APTs ...
Endpoint Central | November 16, 2012Software asset management is not so “soft” and “smooth” “Choco bloc” is the idiom I think of when it comes to asset tracking (Hardware &...
EventLog Analyzer | June 20, 2012Object access auditing simplified: Find the who, what, when, and where of file and folder accesses For many administrators face knowing what actually happened to their files and folders can...