General | November 21, 2023Hacktivism: The intersection of cybersecurity and social activismIn the dynamic landscape of the digital age, where the boundaries between the real world and the virtual world blur, a new form of activism has...
ADAudit Plus | November 21, 20235 limitations of Windows auditing tools and how you can overcome them [Free e-book]Auditing is essential for addressing security, operational, and compliance needs in a Windows Server...
ADSelfService Plus | November 20, 2023[Webinar] Remote work realities: Hacks, hoodies, and how to safeguard your teamIn honor of Computer Security Day on November 30, we're gearing up for an insightful webinar about...
Exchange Reporter Plus | November 20, 2023Make the leap to Exchange Online with seamless migrationAs businesses make their transition to the cloud, administrators find themselves with the task of migrating...
General | November 17, 2023Five worthy reads: The future of tech is cleanFive worthy reads is a regular column on five noteworthy items we’ve discovered while...
Log360 | November 16, 2023How to improve risk scoring and threat detection with UEBA [Free e-book]Did you know that in 2022, the mean time to detect a breach was as many as 207 days? It's...
General | November 16, 2023Top tips: Zero-day vulnerabilities in mobile apps—top 5 risks and mitigation strategiesTop tips is a weekly column where we highlight what’s trending in the tech world and list...
OpManager Plus | November 15, 2023Reach new heights in business excellence with full-stack observabilityOrganizations are constantly looking to grow and expand, which requires establishing...
Patch Manager Plus | November 15, 2023November 2023 Patch Tuesday comes with fixes for 63 vulnerabilities, including 5 zero daysWelcome to November 2023’s Patch Tuesday, which lists fixes for 63 vulnerabilities,...
General | November 13, 2023Data-driven insights with AIOps: Making informed IT decisionsInformation technology (IT) departments are always juggling multiple tasks in the fast...