Navigating the Cybersecurity Landscape with Bluedog’s Sentinel for Small Businesses Introduction: The digital era has brought unprecedented cybersecurity challenges, especially for small and medium-sized enterprises (KMU) in the DACH...
We proudly announce Some of the biggest security blunders of 2020 were tied to the exploitation of VPNs. The limitations of this 25-year-old technology were exposed just as global...
Softlanding announces a Partnership with Appgate an industry leader in secure access solutions . The partnership allows Softlanding , to resell and provide services for App Gate. Helmut Hubmann,...
2020 has proved to us all that a new year does not necessarily have to be better than the last. It could go worse, and for most of us,...
Building management maintenance is important for data center operators. This can be done using VPN access but it has inherent limitations that make the use of VPNs risky for...
Zero Trust is one of the latest buzzwords in cybersecurity. However, it is one of the efficient tools to deal with today’s sophisticated threats. Zero trust is a security...
In a Pass-the-Hash or PtH attack, a threat actor steals a password and without decoding it, reuses it to manipulate an authentication system into creating a new authenticated session...
A feature of Active Directory (AD) domain controllers, the global catalog allows a domain controller to provide detailed information on all the objects in the forest, independent of whether...
Due to ever increasing need for online communication, email has been a major security issue or vulnerability. In fact, antivirus software is not efficient in blocking the social engineering...
Through a joint venture between the National Counterintelligence and Security Center (NSC) and the National Insider Threat Task Force (NITTF), September has been declared National Insider Threat Awareness Month...