IT securitySEC cyber disclosure rules transform CISO role
The SEC’s new cyber disclosure requirement puts a burden on CISOs. But, the requirements are also an opportunity for CISOs, whose role is now more strategic than ever.
IT securityA pen tester shares most-exploited Active Directory vulnerabilities
We asked a pen tester what Active Directory vulnerabilities hackers are exploiting right now, and what to do about it.
IT securityIs there a business case for cloud repatriation?
Take a look at what's really behind the high-profile cases of organizations leaving the cloud. Is there a legitimate business case for cloud repatriation?
IT securityUnderstanding user provisioning and deprovisioning
Learn how efficient provisioning and deprovisioning of user accounts can improve security and streamline access management.
IT securityWhy cyber awareness training is essential for your employees
Cyber awareness and security training for employees can protect your business. Here's how to implement a training plan.
IT securityProtect your business: The importance of corporate cyber security
Strong corporate cyber security can protect your organization from certain attack risks and types of attacks.
IT security11 simple ways to improve your organization’s access control & security
Improve your organization's access control and security and protect against threats with MFA, encryption, VPN’s and more.
IT securityThe cyber attack report
Organizations around the world face an expanding cyber threat landscape, with at least 30,000 daily cyber incidents. Discover the Cyber Attack Report.
IT securityExploring the evolving landscape of cybersecurity patents and innovations
Read about the latest in cybersecurity innovation and the evolving patent landscape, including key players and emerging trends that are shaping this critical field.
IT securityA guide to zero trust for MSPs
You already know about zero trust, but how do you communicate it as a strategy to clients? Learn how communicating the value of zero trust to clients and prospects can build trust and boost revenue.
IT securityStand down, marketers: Zero Trust is not a product
Zero trust has been hyped out of all rational proportions. All the buzz side-steps a key point: Zero trust is not a product.
IT securityLogon management vs. SIEM: The battle for threat detection
How does UserLock’s logon management help detect security threats compared to a SIEM solution? With UserLock, the focus is on securing the logon. And the ability to successfully logon (and stay logged on) requires more than just the right credentials.
IT securityWindows logon audit: Go beyond native Windows security
UserLock prevents concurrent logins as part of a complete access control solution without the security drawbacks of using a windows logon script.
IT securityNeed to find Active Directory users logged in on a domain? Here's how
To find where a user is logged on in a domain in real-time, watch this 2-minute video. Learn how UserLock also helps you to react to alerts and control all logins.
IT securitySchool network management: Balance technology and IT education
How a mixture of technology and effective IT education can help secure access to the network and keep serious security breaches at bay.
IT securityAcing network security in universities, colleges and schools
Academic institutions need to efficiently enforce network access security, restrict careless user behavior, and encourage best practices through alerts and notifications to students, staff and faculty.
IT securityThe challenge to secure SMBs (small and medium-sized businesses)
SMBs and the MSPs serving them face a challenge: IT security needs to be just as effective as enterprise-level software, but the tech needs to be easy for one person to implement and manage.
IT securityWhat lessons can companies learn from getting breached?
Learn from companies who have been breached what lessons you can apply to securing your own organization.
IT securityWhy is the education sector a top target for cyber attacks?
Here's why education always tops the list of industry targets of cyber attacks, and how to identify potential threat activity.
IT securityIT security in higher education: Spotting the attacker
What's a leading attack indicator that no malicious insider or external threat actor can get around? The logon.
IT securityUsing defense in-depth to stop the intrusion kill chain
A layered defense can help stop an intrusion kill chain at the perimeter, with the user and at the endpoint.
IT securityThese 5 key indicators of compromise can prevent a breach
Logons are the one common activity across nearly all attack patterns. They also are the clearest indicators of a compromise. Here’s what to look for to prevent a breach.
IT securityDisruption: Security's worst enemy
Why security solutions should avoid complexity and disruption to both IT teams and all end-users.
IT securityWhy management should care more about IT securty
Here's why the C-suite should care more about IT security (especially the insider threat).