Log360 | January 21, 2021IT security under attack: Credential dumping attacks in Windows environments Most of the time, threat actors in the cybersecurity landscape don't employ advanced...
Log360 | December 18, 2020IT security under attack: Why are group memberships so crucial? Security groups either make or break your IT security. Group memberships are responsible...
Log360 | December 15, 2020Securing a distributed workspace: A cybersecurity checklist for long-term remote work One of the lasting changes brought about by the COVID-19 pandemic is that it forced...
Log360 | December 8, 2020IT security under attack: A typical day in the life of an IT admin or security analyst The job of IT admins and IT security analysts are, without a doubt, some of the most...
IT Security | December 1, 2020How to secure your network from a Ryuk ransomware attack Universal Health Services (UHS), a Fortune 500 company and healthcare services provider,...
Log360 | November 24, 2020IT security under attack blog series: Instant domain persistence by registering a rogue domain controller In this blog in the IT security under attack series, we will learn about an advanced...
IT Security | November 17, 20205 user behavioral patterns to look out for in a decentralized workspace Problem: If there are thousands of employees scattered around hundreds of places, how do...
ADSelfService Plus | November 9, 2020Securing VPN and RDP access to sensitive resources [Free e-book and webinar] At times, life during COVID-19 pandemic can feel like something from a dystopian novel....
General | November 6, 2020Five worthy reads: Has the pandemic accelerated digital transformation? Five worthy reads is a regular column on five noteworthy items we've discovered while...
Log360 | October 29, 2020Is IT security under attack? From credential theft to network vulnerability exploitation and ransomware incidents on...
General | October 24, 2020Five worthy reads: Preparing an incident response plan for the pandemic and beyond [caption id="attachment_63283" align="alignnone" width="1024"] Illustration by Ilamparithi...
General | October 21, 2020Sophisticated phishing Most of us can think of a time when we received a phishing email. In fact, most phishing...