IT Security | December 21, 2021New Log4j flaw: 5 reasons why organizations should worry now The world of cybersecurity has been constantly challenged since the pandemic started. With...
General | December 17, 2021Five worthy reads: Congratulations! You have just been socially engineered Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
IT Security | December 15, 2021EventLog Analyzer year in review: 2021 Our log management solution, EventLog Analyzer, has had yet another busy year. Being named...
AD360 | December 14, 2021The human element in cybersecurity According to IBM's Cost of a Data Breach Report 2021, the global average cost of a data...
AD360 | December 13, 2021Implementing endpoint and network security for a hybrid workforce model The onslaught of the COVID-19 pandemic brought about many changes and disruptions in...
AD360 | December 9, 2021Developing a risk-based approach to cybersecurity in the hybrid workforce model The hybrid workforce model is a novel workplace trend that provides employees the freedom...
AD360 | December 8, 2021Reinventing cybersecurity with a multi-layered approach The complexity of cybersecurity threats has increased over the years. Additionally, the...
General | December 3, 2021Five worthy reads: HIPAA compliance in the age of cybersecurity Five worthy reads is a regular column on five noteworthy items we discovered while...
General | November 8, 2021NOBELIUM cyberattacks revived: What you need to know now [Free e-book] The Microsoft Threat Intelligence Center (MSTIC) has detected that NOBELIUM, the threat...
General | November 5, 2021Five worthy reads: Cybersecurity mesh—An extension of the Zero Trust network Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
AD360 | October 28, 2021Ransomware: How attackers weaponize Active Directory, and what defense measures can stop them [Free e-book] Ransomware attacks continue to rattle organizations across the globe. Especially worrisome...
M365 Manager Plus | October 6, 2021[Free e-book] How to protect Microsoft 365 from the NOBELIUM hackers' phishing attack NOBELIUM is the group behind the SUNBURST backdoor, TEARDROP malware, GoldMax malware,...