Log360 | February 26, 2025IT Security Under Attack: The ultimate playbook to counter cyberthreats An employee checks their inbox and notices an email from HR with a worrying subject line...
Security Information and Event Management | July 5, 2022Data Privacy Day, Part 2: Overcoming challenges in securing customer information In part 1 of this series, we discussed data privacy, the related laws, and the data...
OpManager | June 17, 2022Customer success story: How AASCC built network resilience during the pandemic using OpManager Al Ain Sports & Culture Club (AASCC) is at the forefront of sporting excellence in the...
IT Security | February 3, 2020IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance Cyberattacks are a growing threat, and organizations are investing time and money in...
General | June 22, 2018Five worthy reads: How secure is your smart voice assistant? Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Endpoint Central | October 13, 2017Free e-book: Six best practices for escaping ransomware Breaking news about cyber attacks has reached an all-time high recently, with ransomware...
Password Manager Pro | May 14, 2012Even UK Ministry of Defence Not Immune to Cyber-Attack! Even some of the world's mightiest organizations are not immune to cyber-attacks. Just a...
Password Manager Pro | January 18, 2012Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-1] For information security, the year 2012 has indeed started off with a shocking note....
Password Manager Pro | September 26, 2011The price for information security shortcomings ... Just about four weeks back, the security incident in that company came to light. Today,...