Log360 | December 7, 2021[Free online guide] Critical Windows event IDs and security use cases to monitor According to Statcounter, 75.18% of servers across the globe use a Windows operating...
Log360 | December 8, 2020IT security under attack: A typical day in the life of an IT admin or security analyst The job of IT admins and IT security analysts are, without a doubt, some of the most...
IT Security | July 7, 2020Telecommunications giant reveals an Active Directory server breach. What can we learn from it? We've always been vocal about the imminent threat of breaches and propagated the message...
IT Security | May 14, 2020Email, security, and breaches Email-based attacks can take many forms, and are typically deployed by cybercriminals in...
IT Security | April 23, 2020Hardening Windows security: How to secure your organization—Part 3 This is the final blog of our three-part blog series on living-off-the-land (LOTL) attacks...
IT Security | April 22, 2020Breaking down the San Francisco airport hack On April 7, 2020, the San Francisco International Airport (SFO) released a notice...
IT Security | April 16, 2020Hardening Windows security: How to secure your organization—Part 2 We're back with part two of our three-part blog series on living-off-the-land attacks. If...
Security Information and Event Management | April 9, 2020Hardening Windows security: How to secure your organization—Part 1 The cybersecurity threat landscape is quickly changing. Administrators have become more...
IT Security | April 8, 2020IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck] The definition of an “attack” is changing. The level of complexity and technical expertise...
General | August 22, 2019There's more than one way to get admin privileges Active Directory (AD) was introduced to the IT world in the mid-1990s, and it has come a...