General | April 15, 2020Patch Tuesday April 2020 comes with fixes for 4 zero-days and 15 critical vulnerabilities The second Tuesday of the month is upon us, and this translates to only one thing in the...
Log360 | April 14, 2020The Monopoly Man features in our first-ever Expert Tech Talk podcast series. Listen now! We are pleased to launch our first-ever Expert Tech Talk podcast series featuring...
IT operations management and observability | April 14, 20205 key network aspects to focus on for HIPAA compliance The Health Insurance Portability and Accountability Act, also known as HIPAA, is a...
IT Security | April 13, 2020Cybersecurity challenges of the work-from-home model Just recently, the World Health Organization declared coronavirus a global pandemic. This...
General | April 10, 2020Five worthy reads: Keeping a close eye on cybersecurity while working remotely Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
IT operations management and observability | April 10, 2020Monitoring critical business applications while working remotely With a huge number of employees around the globe working remotely during the COVID-19...
Applications Manager | April 10, 2020How to effectively manage your AWS costs Often, when companies are new to Amazon Web Services (AWS), they aren't focused much on...
Security Information and Event Management | April 9, 2020Hardening Windows security: How to secure your organization—Part 1 The cybersecurity threat landscape is quickly changing. Administrators have become more...
Log360 | April 9, 2020SQL Server, Part 1: Why you should monitor SQL logs Over 44 records are stolen per second every day due to data breaches, and according to the...
General | April 9, 2020Security tips for work-from-home organizations [Webinar] Many organizations including Google, Amazon, Zoho, and Twitter have adopted remote...
IT Security | April 8, 2020IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck] The definition of an “attack” is changing. The level of complexity and technical expertise...
General | April 8, 2020File shadowing: The key to a swift recovery from USB and file-based attacks USB devices are undeniably valuable, but they can be dangerous. On one hand, they are...