OpManager | July 17, 2019OpManager bags gold—listed in Feedspot's top networking blogs and sites to follow in 2019 Great news! The OpManager blog has ranked #15 in Feedspot's top 100 networking blogs and...
ADAudit Plus | July 17, 2019Detecting first time processes on member servers to protect against attacks In a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities...
ADSelfService Plus | July 16, 2019Complying with NIST password guidelines Passwords are the most widely used form of authentication across the globe and serve as...
Log360 | July 15, 2019Five reasons to choose Log360, part 4: Advanced security features Part two and part three of this blog series gave a detailed look at Log360's in-depth...
Mobile Device Manager Plus | July 12, 2019Agent Smith materializes from the matrix of Android malware There’s a new shapeshifting strain of Android malware in the mix. It replaces legitimate...
Patch Manager Plus | July 10, 2019Microsoft Patch Tuesday July 2019: Six publicly disclosed vulnerabilities, two zero-day flaws The much awaited Microsoft Patch Tuesday updates for July 2019 are here. If you're a...
Log360 | July 8, 2019Five reasons to choose Log360, part 3: Comprehensive network auditing In the previous post, we discussed the various environments that Log360 helps you audit...
General | July 5, 2019Five worthy reads: Educating the education sector on cybersecurity Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
RecoveryManager Plus | July 5, 2019Why litigation holds are not a viable alternative to backups Microsoft does not provide backup and recovery tools for its Office 365 services and has...
ADAudit Plus | July 4, 2019Monitoring user logon activity to identify compromised accounts In a previous blog, we saw how ADAudit Plus' user behavior analytics (UBA) capabilities...
Log360 | July 1, 2019Five reasons to choose Log360, part 2: Multi-environment support In the previous post of this series, we looked at how easy it is to get Log360 up and...
General | June 28, 2019Top three reasons passwords are here to stay as the primary form of authentication Yahoo and cell phone companies like Samsung wanted to kill passwords in 2005 and 2014...