Log360 | July 15, 2019Five reasons to choose Log360, part 4: Advanced security featuresPart two and part three of this blog series gave a detailed look at Log360's in-depth auditing capabilities, while part one explained how easy the...
Mobile Device Manager Plus | July 12, 2019Agent Smith materializes from the matrix of Android malwareThere’s a new shapeshifting strain of Android malware in the mix. It replaces legitimate apps with compromised...
Patch Manager Plus | July 10, 2019Microsoft Patch Tuesday July 2019: Six publicly disclosed vulnerabilities, two zero-day flawsThe much awaited Microsoft Patch Tuesday updates for July 2019 are here. If you're a sysadmin, you probably...
Log360 | July 8, 2019Five reasons to choose Log360, part 3: Comprehensive network auditingIn the previous post, we discussed the various environments that Log360 helps you audit and secure. Having...
General | July 5, 2019Five worthy reads: Educating the education sector on cybersecurityFive worthy reads is a regular column on five noteworthy items we’ve discovered while...
RecoveryManager Plus | July 5, 2019Why litigation holds are not a viable alternative to backupsMicrosoft does not provide backup and recovery tools for its Office 365 services and has...
ADAudit Plus | July 4, 2019Monitoring user logon activity to identify compromised accountsIn a previous blog, we saw how ADAudit Plus' user behavior analytics (UBA) capabilities...
Log360 | July 1, 2019Five reasons to choose Log360, part 2: Multi-environment supportIn the previous post of this series, we looked at how easy it is to get Log360 up and...
General | June 28, 2019Top three reasons passwords are here to stay as the primary form of authenticationYahoo and cell phone companies like Samsung wanted to kill passwords in 2005 and 2014...
ADAudit Plus | June 28, 2019Unmask malicious insiders with user behavior analyticsInsider threats are both the most successful way to exfiltrate sensitive business data...