IT security
IT security
SEC cyber disclosure rules transform CISO role
The SEC’s new cyber disclosure requirement puts a burden on CISOs. But, the requirements are also an opportunity for CISOs, whose role is now more strategic than ever.
IT security
A pen tester shares most-exploited Active Directory vulnerabilities
We asked a pen tester what Active Directory vulnerabilities hackers are exploiting right now, and what to do about it.
IT security
Is there a business case for cloud repatriation?
Take a look at what's really behind the high-profile cases of organizations leaving the cloud. Is there a legitimate business case for cloud repatriation?
IT security
Understanding user provisioning and deprovisioning
Learn how efficient provisioning and deprovisioning of user accounts can improve security and streamline access management.
IT security
Why cyber awareness training is essential for your employees
Cyber awareness and security training for employees can protect your business. Here's how to implement a training plan.
IT security
Protect your business: The importance of corporate cyber security
Strong corporate cyber security can protect your organization from certain attack risks and types of attacks.
IT security
11 simple ways to improve your organization’s access control & security
Improve your organization's access control and security and protect against threats with MFA, encryption, VPN’s and more.
IT security
The cyber attack report
Organizations around the world face an expanding cyber threat landscape, with at least 30,000 daily cyber incidents. Discover the Cyber Attack Report.
IT security
Exploring the evolving landscape of cybersecurity patents and innovations
Read about the latest in cybersecurity innovation and the evolving patent landscape, including key players and emerging trends that are shaping this critical field.
IT security
A guide to zero trust for MSPs
You already know about zero trust, but how do you communicate it as a strategy to clients? Learn how communicating the value of zero trust to clients and prospects can build trust and boost revenue.
IT security
Stand down, marketers: Zero Trust is not a product
Zero trust has been hyped out of all rational proportions. All the buzz side-steps a key point: Zero trust is not a product.
IT security
Logon management vs. SIEM: The battle for threat detection
How does UserLock’s logon management help detect security threats compared to a SIEM solution? With UserLock, the focus is on securing the logon. And the ability to successfully logon (and stay logged on) requires more than just the right credentials.
IT security
Windows logon audit: Go beyond native Windows security
UserLock prevents concurrent logins as part of a complete access control solution without the security drawbacks of using a windows logon script.
IT security
Need to find Active Directory users logged in on a domain? Here's how
To find where a user is logged on in a domain in real-time, watch this 2-minute video. Learn how UserLock also helps you to react to alerts and control all logins.
IT security
School network management: Balance technology and IT education
How a mixture of technology and effective IT education can help secure access to the network and keep serious security breaches at bay.
IT security
Acing network security in universities, colleges and schools
Academic institutions need to efficiently enforce network access security, restrict careless user behavior, and encourage best practices through alerts and notifications to students, staff and faculty.
IT security
The challenge to secure SMBs (small and medium-sized businesses)
SMBs and the MSPs serving them face a challenge: IT security needs to be just as effective as enterprise-level software, but the tech needs to be easy for one person to implement and manage.
IT security
What lessons can companies learn from getting breached?
Learn from companies who have been breached what lessons you can apply to securing your own organization.
IT security
Why is the education sector a top target for cyber attacks?
Here's why education always tops the list of industry targets of cyber attacks, and how to identify potential threat activity.
IT security
IT security in higher education: Spotting the attacker
What's a leading attack indicator that no malicious insider or external threat actor can get around? The logon.
IT security
Using defense in-depth to stop the intrusion kill chain
A layered defense can help stop an intrusion kill chain at the perimeter, with the user and at the endpoint.
IT security
These 5 key indicators of compromise can prevent a breach
Logons are the one common activity across nearly all attack patterns. They also are the clearest indicators of a compromise. Here’s what to look for to prevent a breach.
IT security
Disruption: Security's worst enemy
Why security solutions should avoid complexity and disruption to both IT teams and all end-users.
IT security
Why management should care more about IT securty
Here's why the C-suite should care more about IT security (especially the insider threat).