2020 has proved to us all that a new year does not necessarily have to be better than the last. It could go worse, and for most of us,...
Building management maintenance is important for data center operators. This can be done using VPN access but it has inherent limitations that make the use of VPNs risky for...
Zero Trust is one of the latest buzzwords in cybersecurity. However, it is one of the efficient tools to deal with today’s sophisticated threats. Zero trust is a security...
In a Pass-the-Hash or PtH attack, a threat actor steals a password and without decoding it, reuses it to manipulate an authentication system into creating a new authenticated session...
A feature of Active Directory (AD) domain controllers, the global catalog allows a domain controller to provide detailed information on all the objects in the forest, independent of whether...
Due to ever increasing need for online communication, email has been a major security issue or vulnerability. In fact, antivirus software is not efficient in blocking the social engineering...
Through a joint venture between the National Counterintelligence and Security Center (NSC) and the National Insider Threat Task Force (NITTF), September has been declared National Insider Threat Awareness Month...
This year has been a year like no other, with a never-ending series of events. We have seen the evolution of the Coronavirus pandemic at a glance, the continuing...
Digital Transformation—what is it? The description of the Wiki is very straight forward: “Digital Transformation is the adoption of digital technology to transform services or businesses, through replacing non-digital...
Microsoft Teams is everywhere in 2020. Adoption was growing before the pandemic, and the surge of remote workers sent usage into overdrive. However, a by-product of accelerated growth is...