• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:Cybersecurity

Massive ransomware attacks of 2021 and how to avoid them

Endpoint Central | February 9, 2022

Massive ransomware attacks of 2021 and how to avoid them

2021 brought a new wave of cyberattacks that proved to be detrimental to the era of...

IT Security | December 21, 2021

New Log4j flaw: 5 reasons why organizations should worry now

The world of cybersecurity has been constantly challenged since the pandemic started. With...

Five worthy reads: Congratulations! You have just been socially engineered

General | December 17, 2021

Five worthy reads: Congratulations! You have just been socially engineered

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

IT Security | December 15, 2021

EventLog Analyzer year in review: 2021

Our log management solution, EventLog Analyzer, has had yet another busy year. Being named...

AD360 | December 14, 2021

The human element in cybersecurity

According to IBM's Cost of a Data Breach Report 2021, the global average cost of a data...

AD360 | December 13, 2021

Implementing endpoint and network security for a hybrid workforce model

The onslaught of the COVID-19 pandemic brought about many changes and disruptions in...

AD360 | December 9, 2021

Developing a risk-based approach to cybersecurity in the hybrid workforce model

The hybrid workforce model is a novel workplace trend that provides employees the freedom...

AD360 | December 8, 2021

Reinventing cybersecurity with a multi-layered approach

The complexity of cybersecurity threats has increased over the years. Additionally, the...

Five worthy reads: HIPAA compliance in the age of cybersecurity

General | December 3, 2021

Five worthy reads: HIPAA compliance in the age of cybersecurity

Five worthy reads is a regular column on five noteworthy items we discovered while...

NOBELIUM cyberattacks revived: What you need to know now [Free e-book]

General | November 8, 2021

NOBELIUM cyberattacks revived: What you need to know now [Free e-book]

The Microsoft Threat Intelligence Center (MSTIC) has detected that NOBELIUM, the threat...

Five worthy reads: Cybersecurity mesh—An extension of the Zero Trust network

General | November 5, 2021

Five worthy reads: Cybersecurity mesh—An extension of the Zero Trust network

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

AD360 | October 28, 2021

Ransomware: How attackers weaponize Active Directory, and what defense measures can stop them [Free e-book]

Ransomware attacks continue to rattle organizations across the globe. Especially worrisome...

Page 7 of 14« First«...56789...»Last »