Security Information and Event Management | January 27, 2022Data Privacy Day, Part 1: What you need to know about data privacy Data Privacy Day (known in Europe as Data Protection Day) is an international event aimed...
General | June 11, 2021Five worthy reads: Confidential computing - The way forward in cloud security Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Mobile Device Manager Plus | December 7, 2020Why VPNs on mobile devices are a crucial part of securing access to corporate data Securing access to business resources has always been of high priority for admins and IT...
ADSelfService Plus | November 25, 2020Avert cyberattacks against MFA using FBI-recommended countermeasures [Webinar] With the rise of remote work, multi-factor authentication (MFA) has become more essential...
Log360 | August 28, 2020Data security under the CCPA: A master class for IT administrators July 1, 2020 was a monumental day when it came to privacy laws in the United States. It...
General | June 12, 2020Five worthy reads: Privacy in pandemic management Five worthy reads is a regular column on five noteworthy items we have discovered while...
IT Security | June 3, 2020Securing Azure Active Directory from PowerShell abuse Malware attacks are evolving and once common tactics are becoming a thing of the past....
IT Security | May 14, 2020Email, security, and breaches Email-based attacks can take many forms, and are typically deployed by cybercriminals in...
IT Security | April 23, 2020Hardening Windows security: How to secure your organization—Part 3 This is the final blog of our three-part blog series on living-off-the-land (LOTL) attacks...
IT Security | April 22, 2020Breaking down the San Francisco airport hack On April 7, 2020, the San Francisco International Airport (SFO) released a notice...
IT Security | April 16, 2020Hardening Windows security: How to secure your organization—Part 2 We're back with part two of our three-part blog series on living-off-the-land attacks. If...
Security Information and Event Management | April 9, 2020Hardening Windows security: How to secure your organization—Part 1 The cybersecurity threat landscape is quickly changing. Administrators have become more...