Identity and access management | July 6, 2017[Free Webinar] Awesome Active Directory password controlsActive Directory passwords are easy to crack. Since the password controls have not changed in over 15 years, attackers have been given ample...
Endpoint Central | July 5, 2017WannaCry: Battle with the shadow"There are two kinds of people in America today: those who have experienced a foreign cyber attack and know it...
IT Security | July 4, 2017Log management and SIEM fundamentals: Mitigating security threats In parts 1 and 2 of this blog series, we went over SIEM and its role in performing a thorough audit of your...
IT Security | July 3, 2017Protecting against Petya and other ransomwareAs a security professional, which do you fear more: 1) explaining to your boss or CEO that your enterprise's...
Endpoint Central | June 30, 2017WannaCry again? Meet Adylkuzz, its sneaky cryptocurrency mining siblingMore than 400,000 computers wrldwide have been infected with WannaCry ransomware since...
Identity and access management | June 29, 2017Get notified when a folder is shared on servers and workstationsWe all know that sharing a folder on a server opens up an entry point to that server. Even...
IT Security | June 28, 2017Log management and SIEM fundamentals: Comprehensive log collection and auditingThe first step in SIEM is collecting log data. Log data, as we saw in part 1, is what...
Endpoint Central | June 26, 2017If you think WannaCry is huge, wait for EternalRocks!While the world was responding to the WannaCry attack—which only utilized the EternalBlue...
General | June 25, 2017Free webinar: Ensuring security and consistency of end users' self-service actions in Active DirectoryAs an IT administrator, you've surely witnessed problems with users' self-service...
IT Security | June 22, 2017Log management and SIEM fundamentals: Getting startedCyber attacks and network breaches can bring even the largest organizations to their knees...