OpUtils | April 19, 2021DHCP server monitoring made easy with OpUtils In today's complex IT infrastructures, Dynamic Host Configuration Protocol (DHCP)...
AD360 | April 16, 2021Operation panopticon: How a weak IAM strategy led to the security camera hack across organizations On March 9, 2021, Verkada, a software company that specializes in making security cameras...
General | April 16, 2021Five worthy reads: Location intelligence—the key to next-level data utilization Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Patch Manager Plus | April 14, 2021Microsoft Patch Tuesday April 2021 fixes 108 vulnerabilities, including 5 zero-days Yet another month, yet another Patch Tuesday. With the never-ending cybersecurity threats...
ADSelfService Plus | April 6, 2021The road ahead: McKinsey's top 5 cybersecurity predictions for 2021 and beyond What is a bigger threat to mankind: nuclear weapons or cybercrime? While most would say...
General | April 1, 2021Is the cloud coming to all of us? During the past twenty years, so much has changed in the IT office. Two decades ago, we...
General | March 31, 2021Five worthy reads: The unexpected costs following a cyberattack Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Log360 | March 30, 2021Azure security 101: Security essentials, logs, authentication, and more “Where necessity speaks, it demands”. This old saying seems particularly apt right now...
ADAudit Plus | March 24, 2021Windows logon auditing: Everything you need to know in only 10 minutes [Free e-book] User logon activity needs to be audited to meet various security, operational, and...
OpUtils | March 23, 2021Unraveling open port threats and enhancing security with port scanning tools From exposing your network vulnerabilities to becoming a passageway for intruders, open...
General | March 12, 2021Five worthy reads: Understanding quantum computing and its impact on cybersecurity Five worthy reads is a regular column on five noteworthy items we discovered while...
Key Manager Plus | March 11, 2021Integrate certificate life cycle management with enterprise MDM and boost your mobile ecosystem security A huge portion of today's corporate network is made up of mobile endpoints, such as...