One of the most common ways for attackers to slip into a corporate network is by compromising the username and password of a legitimate user account. Usernames are typically trivial to guess because...
Identity theft is a concern for everyone living in the digital age. By stealing someone’s identity, a criminal can gain access to their credit cards and financial accounts or apply for credit...
Gartner listed identity threat detection and response (ITDR) among its top security and risk management trends for 2022 and beyond — and study after study keeps verifying the importance of an...
While many organizations have transitioned elements of their infrastructure to the cloud, Active Directory (AD) remains the primary identity store, overseeing users, computers and permissions....
Infrastructure
November 20, 2018
Microsoft SharePoint is widely used by organizations to enhance collaboration, manage documents and streamline access to information. Users can easily store and organize documents, and collaborate...
Infrastructure
May 15, 2018
There are many different types of attacks in cyber security — and network security teams must worry about all of them. While no organization can protect themselves against every type of threat, a...