IT Security | April 8, 2020IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck] The definition of an “attack” is changing. The level of complexity and technical expertise...
ADAudit Plus | February 27, 2020IT security: Keep calm and monitor PowerShell In our last release of the PowerShell security series, we talked about how PowerShell...
IT Security | February 3, 2020IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance Cyberattacks are a growing threat, and organizations are investing time and money in...
IT Security | January 10, 2020IT security: PowerShell as a cyberattack tool Tools and features introduced with the intention of benefiting and empowering an...
Mobile Device Manager Plus | September 17, 2019Four simple ways to secure data in misplaced or stolen devices In the modern era of mobility, corporate data is remotely accessed by employees around...
Log360 | August 1, 2019Dealing with three pathbreaking scenarios under the CCPA The "right to be forgotten" is one of the new rights consumers will have under the CCPA. ...
Log360 | July 15, 2019Five reasons to choose Log360, part 4: Advanced security features Part two and part three of this blog series gave a detailed look at Log360's in-depth...
General | July 5, 2019Five worthy reads: Educating the education sector on cybersecurity Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | January 23, 2019Six reasons why data backups are crucial for your business The increase in ransomware attacks and high-profile data breaches over the last few years...
Log360 | December 3, 2018Conquer it with correlation—Part 2: The data breach In my previous post, we looked at how event correlation can be used to deal with advanced...
Log360 | November 26, 2018Conquer it with correlation—Part 1: The advanced persistent threat (APT) Among all the pesky attacks that keep security administrators working late, advanced...
IT Security | October 2, 2018Simplifying security auditing, part 6: Compliance and the cloud In part 5, we looked at auditing your network device logs. A decade ago, security...