Results
No result found.
IT security
- IT security
Shared lessons, stronger defenses: What CISOs can learn from others' worst days.
Key takeaways for CISOs on building resilient security systems and teams.
Read - IT security
SEC cyber disclosure rules transform CISO role
The SEC’s new cyber disclosure requirement puts a burden on CISOs. But, the requirements are also an opportunity for CISOs, whose role is now more strategic than ever.
Read - IT security
A pen tester shares most-exploited Active Directory vulnerabilities
We asked a pen tester what Active Directory vulnerabilities hackers are exploiting right now, and what to do about it.
Read - IT security
Is there a business case for cloud repatriation?
Take a look at what's really behind the high-profile cases of organizations leaving the cloud. Is there a legitimate business case for cloud repatriation?
Read - IT security
Understanding user provisioning and deprovisioning
Improve security and streamline access management with efficient provisioning and deprovisioning of user accounts.
Read - IT security
Why cyber awareness training is essential for your employees
Cyber awareness and security training for employees can protect your business. Here's how to implement a training plan.
Read - IT security
Protect your business: The importance of corporate cyber security
Strong corporate cyber security can protect your organization from certain attack risks and types of attacks.
Read - IT security
11 simple ways to improve your organization’s access control & security
Improve your organization's access control and security and protect against threats with MFA, encryption, VPN’s and more.
Read - IT security
The cyber attack report
Organizations around the world face an expanding cyber threat landscape, with at least 30,000 daily cyber incidents. Discover the Cyber Attack Report.
Read - IT security
Exploring the evolving landscape of cybersecurity patents and innovations
Read about the latest in cybersecurity innovation and the evolving patent landscape, including key players and emerging trends that are shaping this critical field.
Read - IT security
A guide to zero trust for MSPs
You already know about zero trust, but how do you communicate it as a strategy to clients? Learn how communicating the value of zero trust to clients and prospects can build trust and boost revenue.
Read - IT security
Stand down, marketers: Zero Trust is not a product
Zero trust has been hyped out of all rational proportions. All the buzz side-steps a key point: Zero trust is not a product.
Read - IT security
Logon management vs. SIEM: The battle for threat detection
How does UserLock’s logon management help detect security threats compared to a SIEM solution? With UserLock, the focus is on securing the logon. And the ability to successfully logon (and stay logged on) requires more than just the right credentials.
Read - IT security
A comprehensive guide to Windows logon audit: Go beyond native Windows solutions
Explore advanced Windows logon audit techniques to enhance security and compliance. Learn how UserLock offers superior auditing beyond native Windows solutions.
Read - IT security
Need to find Active Directory users logged in on a domain? Here's how
To find where a user is logged on in a domain in real-time, watch this 2-minute video. Learn how UserLock also helps you to react to alerts and control all logins.
Read - IT security
School network management: Balance technology and IT education
How a mixture of technology and effective IT education can help secure access to the network and keep serious security breaches at bay.
Read - IT security
Acing network security in universities, colleges and schools
Academic institutions need to efficiently enforce network access security, restrict careless user behavior, and encourage best practices through alerts and notifications to students, staff and faculty.
Read - IT security
SMB security: The challenge to secure SMBs (small and medium-sized businesses)
SMBs and the MSPs serving them face a challenge: SMB security needs to be just as effective as enterprise-level software, but the tech needs to be easy enough for one person to implement and manage.
Read - IT security
What lessons can companies learn from getting breached?
Learn from companies who have been breached what lessons you can apply to securing your own organization.
Read - IT security
Why is the education sector a top target for cyber attacks?
Here's why education always tops the list of industry targets of cyber attacks, and how to identify potential threat activity.
Read - IT security
IT security in higher education: Spotting the attacker
What's a leading attack indicator that no malicious insider or external threat actor can get around? The logon.
Read - IT security
Using defense in-depth to stop the intrusion kill chain
A layered defense can help stop an intrusion kill chain at the perimeter, with the user and at the endpoint.
Read - IT security
These 5 key indicators of compromise can prevent a breach
Logons are the one common activity across nearly all attack patterns. They also are the clearest indicators of a compromise. Here’s what to look for to prevent a breach.
Read - IT security
Disruption: Active Directory security's worst enemy
Active Directory security solutions need to avoid complexity and disruption — for IT teams as well as all end-users.
Read