The onslaught of the COVID-19 pandemic brought about many changes and disruptions in cybersecurity. Organizations globally shifted to remote work scenarios to enable their employees to...
Insider attacks
Advanced Active Directory attacks: Simulating domain controller behavior
There was a time when cyberattacks on identity and authentication infrastructures [like Active Directory (AD)] were immensely challenging to perform. A lot of forethought had...
Preventing insider threats with anomaly detection: ManageEngine-Forrester [Webinar]
With the unexpected pandemic throwing a wrench into normal life and regular work patterns and styles, organizations globally are encouraging their employees to work from home as...
SQL Server, Part 3: Adopting the principle of least privilege
In the previous blog in this series, we discussed authentication and authorization mechanisms, and how configuring them properly can help secure your databases. In this blog, we’ll talk about how data...