Log360 | May 10, 2023Discover how attackers exploit DNS vulnerabilities in Active DirectoryA DNS server is an integral part of an AD environment. Simple yet crucial activities are accomplished using DNS servers, such as authenticating,...
General | May 10, 2023Securing your enterprise: The importance of a security operations centerThe world is increasingly embracing cloud technology. The fact that cloud requires minimal infrastructure and...
Patch Manager Plus | May 10, 2023May 2023 Patch Tuesday comes with fixes for 38 vulnerabilities, including 3 zero daysWelcome to May 2023’s Patch Tuesday, which lists fixes for 38 vulnerabilities, including three zero days and...
General | May 9, 2023Artificial intelligence might be insulting your intelligenceIt's Saturday morning. You've decided to sleep in after last night's bender, and you can't be bothered about...
Log360 | May 8, 2023[Webinar] How to build a team to run your SOC and SIEMSetting up the required defenses against cyberattacks is high on every organization's...
ADSelfService Plus | May 5, 2023Securing your offline remote workforce with MFATwenty percent of IT enterprises experienced a breach due to a remote worker during the...
General | May 5, 2023Five worthy reads: Shielding mobile applications from cyberattackersFive worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | May 4, 2023Top tips: Implementing ChatGPT at an enterprise levelChatGPT is quickly being adopted for optimizing pretty much any vertical. You can write...
General | May 4, 2023Why endpoint management is your best defense against a recessionIn the face of a looming recession, companies are hunting for ways to reduce costs and...
Applications Manager | May 3, 2023Microsoft DCOM hardening and its impact on Applications ManagerMicrosoft recently acknowledged a critical vulnerability in the WMI connection affecting...