Insider attacks

Implementing endpoint and network security for a hybrid workforce model

The onslaught of the COVID-19 pandemic brought about many changes and disruptions in cybersecurity. Organizations globally shifted to remote work scenarios to enable their employees to...

AD360 3 min read Read

Advanced Active Directory attacks: Simulating domain controller behavior

There was a time when cyberattacks on identity and authentication infrastructures [like Active Directory (AD)] were immensely challenging to perform. A lot of forethought had...

IT Security 3 min read Read

Preventing insider threats with anomaly detection: ManageEngine-Forrester [Webinar]

With the unexpected pandemic throwing a wrench into normal life and regular work patterns and styles, organizations globally are encouraging their employees to work from home as...

General 2 min read Read

SQL Server, Part 3: Adopting the principle of least privilege

In the previous blog in this series, we discussed authentication and authorization mechanisms, and how configuring them properly can help secure your databases. In this blog, we’ll talk about how data...

IT Security 3 min read Read