Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Jeff Petters

3 Tips to Monitor and Secure Exchange Online

Even if you don’t have your sights on the highest office in the country, keeping a tight leash on your emails is now more important than ever. Email is commonly...

Read More

Complete Guide to Windows File System Auditing

Windows file system auditing is an important tool to keep in your cybersecurity forensics toolbox.  Read on to learn more about file system auditing on Windows, and why you will...

Read More

What is Privileged Access Management (PAM)?

When a breach happens, the first question people ask is, “What did the company do wrong?” The short answer is – it depends. However, we do know one mistake many...

Read More

Active Directory Security Best Practices

Active Directory security is important because Active Directory(AD) represents the keys to the kingdom. Imagine that box where your store all of the physical keys to every door in the...

Read More

What is Group Policy, GPO and Why it Matters for Data Security

Group policy is a feature of Microsoft Windows Active Directory that adds additional controls to user and computer accounts. Group policies provide centralized management and operating systems configurations of user’s...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.