Log360 | June 21, 2021The role of endpoints in the security of your network Endpoint security is a hot topic of discussion, especially now with so many businesses...
Unified endpoint management and security | December 24, 2020Protect your organization against Adrozek Adrozek is a malicious browser modifier that, when installed on users' machines, infects...
General | October 24, 2020Five worthy reads: Preparing an incident response plan for the pandemic and beyond Illustration by Ilamparithi Raju Five worthy reads is a regular column on five noteworthy...
Log360 | August 4, 2020Can a misconfigured user account lead to a security breach? Do you remember the last time you had to reset the password for an admin user? Or the time...
IT Security | July 30, 2020Unfolding the Twitter security incident In case 2020 wasn't dystopian enough, here's some more unbelievable news. On July 15, 2020...
General | May 13, 2020Cybersecurity use cases for better remote workforce management Credits- Illustrator: S Amirthalingam In the new normal, if your business has chosen...
General | July 5, 2019Five worthy reads: Educating the education sector on cybersecurity Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | March 8, 2019Five worthy reads: A look at the healthcare sector's persistent insider threat Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | March 30, 2018Five worthy reads: Unified endpoint management, a 360° look at organizational security Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Endpoint Central | December 6, 20175 building blocks for seamless endpoint security Enterprise security has become a top priority with the recent spike in cyber attacks....