ADManager Plus | June 26, 2024Why outdated access control is putting your data at risk Imagine this: you wake up to a notification - your company has suffered a data breach....
General | April 2, 2024RaaS attacks are on the rise: Top 5 tips to protect your organization Over the years, we have seen a substantial amount of cyberattacks happening around the...
Identity and access management | July 26, 2022A practical approach to Active Directory Domain Services, Part 10: A study into Group Policies and AD We have covered a plethora of topics on Active Directory (AD) in parts one to nine of...
Identity and access management | July 21, 2022A practical approach to Active Directory Domain Services, Part 9: An AD reality check Have you looked into some of the most well-known Active Directory (AD) attacks from...
Security Information and Event Management | July 5, 2022Data Privacy Day, Part 2: Overcoming challenges in securing customer information In part 1 of this series, we discussed data privacy, the related laws, and the data...
General | August 6, 2021Five worthy reads: The never-ending love story between cyberattacks and healthcare Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
IT Security | July 30, 2020Unfolding the Twitter security incident In case 2020 wasn't dystopian enough, here's some more unbelievable news. On July 15, 2020...
IT Security | July 7, 2020Telecommunications giant reveals an Active Directory server breach. What can we learn from it? We've always been vocal about the imminent threat of breaches and propagated the message...
IT Security | February 3, 2020IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance Cyberattacks are a growing threat, and organizations are investing time and money in...
Log360 | October 18, 2019Combating threats with UEBA: Money matters In this four-part series, we explore hypothetical cyberattacks inspired by real-life...
Log360 | September 9, 2019Combating threats with UEBA: Health is wealth In this four-part series, Combating threats with UEBA, we explore hypothetical...
ADSelfService Plus | August 9, 2019Azure AD Password Protection: The good, the bad, and the ugly People often use common words as their passwords so they don’t forget them. This practice...