IT Security | October 5, 202113 reasons Log360 is the SIEM solution for you: Part 2 Read the first part here. #8: You get a state-of-the-art compliance management tool Our...
IT Security | May 14, 2020Email, security, and breaches Email-based attacks can take many forms, and are typically deployed by cybercriminals in...
Security Information and Event Management | April 9, 2020Hardening Windows security: How to secure your organization—Part 1 The cybersecurity threat landscape is quickly changing. Administrators have become more...
IT Security | April 8, 2020IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck] The definition of an “attack” is changing. The level of complexity and technical expertise...
ADAudit Plus | February 27, 2020IT security: Keep calm and monitor PowerShell In our last release of the PowerShell security series, we talked about how PowerShell...
IT Security | January 10, 2020IT security: PowerShell as a cyberattack tool Tools and features introduced with the intention of benefiting and empowering an...