ADAudit Plus | June 6, 2019[Infographic]Three tips to simplify Active Directory compliance and auditing In the previous blog of this series, "[Infographic] Still manually onboarding users into...
Log360 | April 29, 2019Log360 named a Champion in Software Reviews’ 2019 SIEM Customer Experience Report Software Reviews, a division of Info-Tech Research Group, has named Log360 a Champion in...
Log360 | April 22, 2019Free webinar on accelerating threat detection and response with user and entity behavior analytics (UEBA) Most security personnel take measures to combat threats from outside the network. However,...
Firewall Analyzer | April 15, 2019Rule impact analysis: A new dawn of firewall policy planning A network security device is only as strong as its rules and policies. Firewalls can have...
ADAudit Plus | February 25, 2019Quick tips to ensure your Azure AD is safe from threats Being the gatekeeper of Microsoft's cloud solutions, Azure AD comes with a wide range of...
ADAudit Plus | February 11, 2019Tracking insider threats with AI If you thought masked hackers in dark rooms spreading malware were your only security...
Log360 | December 18, 2018Conquer it with correlation—Part 3: Cryptojacking In the previous posts of this blog series, we discussed advanced persistent threats and...
Log360 | December 3, 2018Conquer it with correlation—Part 2: The data breach In my previous post, we looked at how event correlation can be used to deal with advanced...
Log360 | November 26, 2018Conquer it with correlation—Part 1: The advanced persistent threat (APT) Among all the pesky attacks that keep security administrators working late, advanced...
Firewall Analyzer | November 22, 2018Firewall Analyzer enhancements that fire up your firewall devices The Firewall Analyzer team is constantly working on enhancements to improve its product...
ADAudit Plus | November 16, 2018Account lockout and management tools Sometimes, when you get a call regarding a password reset, you can already guess who it...
Log360 | September 26, 2018Webinar: Learn a simple three-step approach to tackling threats Technology has a lot to offer, from streamlining your business processes to protecting...