logo
October 18, 2016 | Ryan Brooks

User Behavior Analytics: Best Practices You Should Start Now

How much do you know about User Behavior Analytics (UBA), emerging solution that helps detect growing malicious and abusive insider activity across IT environment that otherwise can go unnoticed? This article details the key challenges for protecting the most critical assets within your IT...
June 3, 2016 | Troy Thompson

6 Tools to Protect Your Domain Controllers

There are many things that you can do as an administrator to reduce or eliminate risks associated with your Domain Controllers.  In this article, we’ll take a look at some tools you can employ to help with this. Attack Surface – This concept refers to software, protocols and ports are used...
April 20, 2016 | Alex Vovk

4 Rules to Enhance Email Security in the Cloud

The long-existing problem of email hacking appears to be unsolved by 2016. According to the recent warning released by FBI, companies have lost above $2.3 billion over the past three years due to email frauds, in which the employees are tricked into wiring funds to adversaries by fake messages sent...
September 22, 2015 | Adam Bertram

Tracking Malicious Windows Server Events with PowerShell

Windows servers can potentially generate thousands—or even hundreds of thousands—of events daily. Most are created from perfectly safe events that system administrators use to get a glimpse of what’s going on. An event might be generated to indicate a disk is running out of free space, an...
...