2020 has proved to us all that a new year does not necessarily have to be better than the last. It could go worse, and for most of us,...
Building management maintenance is important for data center operators. This can be done using VPN access but it has inherent limitations that make the use of VPNs risky for...
Zero Trust is one of the latest buzzwords in cybersecurity. However, it is one of the efficient tools to deal with today’s sophisticated threats. Zero trust is a security...
In a Pass-the-Hash or PtH attack, a threat actor steals a password and without decoding it, reuses it to manipulate an authentication system into creating a new authenticated session...
A feature of Active Directory (AD) domain controllers, the global catalog allows a domain controller to provide detailed information on all the objects in the forest, independent of whether...
Due to ever increasing need for online communication, email has been a major security issue or vulnerability. In fact, antivirus software is not efficient in blocking the social engineering...