Learn how you can leverage ConnectWise Control solution as a new approach to manage your remote desktop and mobile support needs.
By Amakiri Welekwe
in Net Admin
on February 14, 2024
Pass the hash attacks can be very difficult to detect because attackers use "legitimate" credentials to pull them off. This post looks at how these attacks work and what you can do to defend against them.
By Marc Dahan
in Information Security
on September 28, 2023
Side-channel attacks don't target cryptographic systems, but their implementations instead. Find out how they can compromise secure algorithms.
By Josh Lake
in Information Security
on August 4, 2023
Databases exposed by a criminal group leaked more than 300 million Facebook user IDs, names, and phone numbers on the web.
By Paul Bischoff
in Information Security
on March 9, 2020
Automate your firewall change management process with the best firewall change management solutions.
By Amakiri Welekwe
in Net Admin
on October 29, 2024
42 million user IDs and phone numbers for a third-party version of Telegram were exposed online without a password. The accounts belong to users in Iran, where the official Telegram app is blocked.
By Paul Bischoff
in Information Security
on March 30, 2020
Do you want to work in a senior level cyber security position? If so, you might want to consider the career path of a chief information security officer. This highly responsible role carries a lot of benefits, which we explore in this article.
By Sam Woolfe
in Information Security
on February 9, 2021
FortiSIEM from Fortinet is a system protection platform. This tool examines live transactions and logs records to detect intrusion and malicious activity.
By Stephen Cooper
in Net Admin
on July 21, 2022
MetricFire was assembled by slotting together free, open-source tools and adding functionality; Datadog was commercially developed from the ground up. So which is the best system monitor?
By Stephen Cooper
in Net Admin
on April 5, 2024
Ransomware as a Service (RaaS) has become an increasingly popular tool among cyber criminals. We reveal what RaaS is and how you can avoid falling victim to it.
By Aimee O'Driscoll
in Information Security
on January 17, 2024