Cyber Chief Magazine: Strategies for protecting your data in the cloud Download Now
1 May, 2019 | Brian Johnson

What Are Mousejacking Attacks, and How to Defend Against Them

If you are using a wireless keyboard or mouse on your computer, beware of the risk of getting mousejacked. Using this technique, attackers could take over your entire Active Directory in just minutes using a $15 USB radio device that discovers vulnerable devices. In this podcast, Brian Johnson,...
23 August, 2018 | Jeff Melnick

Auditing Windows Systems

Continuously auditing the activity in your network is one of the most critical security best practices, since it helps you notice potentially malicious activity early enough to take action and prevent data breaches, system downtime and compliance failures. Top methods of Windows auditing...
15 March, 2016 | Alex Vovk

Infographics: Common Drawbacks of SIEM Solutions

SIEM is a complex solution that requires thorough maintenance and support, which often skyrockets SIEM expenses. The need to hire and train more SIEM analysts is named as the main factor that significantly influences the total cost of SIEM ownership. It earned the highest score (4.8) in the rating...
1 March, 2016 | Jeff Melnick

SysAdmin Magazine March 2016: Preparing for IT Auditors

Over the last few years, there has been a rise in the number of vulnerabilities that have been publicly announced.  Following compliance regulations is much more than a duty for stakeholders, it is inevitable component of the corporate security strategy. On the other hands passing compliance...
Show more articles