• Topics
    • Advanced IT analytics
    • Application Performance
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:data breach

ADManager Plus | June 26, 2024

Why outdated access control is putting your data at risk

Imagine this: you wake up to a notification - your company has suffered a data breach....

RaaS attacks are on the rise: Top 5 tips to protect your organization

General | April 2, 2024

RaaS attacks are on the rise: Top 5 tips to protect your organization

Over the years, we have seen a substantial amount of cyberattacks happening around the...

A practical approach to Active Directory Domain Services, Part 10: A study into Group Policies and AD

Identity and access management | July 26, 2022

A practical approach to Active Directory Domain Services, Part 10: A study into Group Policies and AD

We have covered a plethora of topics on Active Directory (AD) in parts one to nine of...

A practical approach to Active Directory Domain Services, Part 9: An AD reality check

Identity and access management | July 21, 2022

A practical approach to Active Directory Domain Services, Part 9: An AD reality check

Have you looked into some of the most well-known Active Directory (AD) attacks from...

Security Information and Event Management | July 5, 2022

Data Privacy Day, Part 2: Overcoming challenges in securing customer information

In part 1 of this series, we discussed data privacy, the related laws, and the data...

Five worthy reads: The never-ending love story between cyberattacks and healthcare

General | August 6, 2021

Five worthy reads: The never-ending love story between cyberattacks and healthcare

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Unfolding the Twitter security incident

IT Security | July 30, 2020

Unfolding the Twitter security incident

In case 2020 wasn't dystopian enough, here's some more unbelievable news. On July 15, 2020...

Telecommunications giant reveals an Active Directory server breach. What can we learn from it?

IT Security | July 7, 2020

Telecommunications giant reveals an Active Directory server breach. What can we learn from it?

We've always been vocal about the imminent threat of breaches and propagated the message...

IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance 

IT Security | February 3, 2020

IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance 

Cyberattacks are a growing threat, and organizations are investing time and money in...

Combating threats with UEBA: Money matters 

Log360 | October 18, 2019

Combating threats with UEBA: Money matters 

In this four-part series, we explore hypothetical cyberattacks inspired by real-life...

Combating threats with UEBA: Health is wealth

Log360 | September 9, 2019

Combating threats with UEBA: Health is wealth

In this four-part series, Combating threats with UEBA, we explore hypothetical...

Azure AD Password Protection: The good, the bad, and the ugly

ADSelfService Plus | August 9, 2019

Azure AD Password Protection: The good, the bad, and the ugly

People often use common words as their passwords so they don’t forget them. This practice...

Page 1 of 34712»Last »