A Guide To Microsoft Azure Security Logging
Azure generates logs that provide comprehensive visibility into your environment. Learn what logs to monitor and how in this Azure security logging guide.
Read More5 Best Practices For Security Log Retention
When a cybersecurity incident occurs, logs are the key to understanding what happened. That's why it's important to learn log retention best practices.
Read MoreOpenSSL Vulnerability: What You Should Know
A critical vulnerability was discovered in OpenSSL, a popular open source cryptography library. Learn what you should do to protect your organization.
Read MoreFind a User with Their Security ID in Windows
Go over several different options for finding users with just their Windows Security IDs, since everyone’s environment and situation is different.
Read MoreActive Directory Password Auditing with NtdsAudit & NThashes
Active Directory password auditing using NtdsAudit and NThashes tools will help you locate passwords that have been compromised in breaches.
Read MoreEvent ID 4732: The Case of the Missing Username
Learn all about Event ID 4732, including its small quirk: the security log itself does not contain the username of who got added to the local group.
Read MoreThe Importance of PCI Compliance
Being compliant is a necessary box to check, but it has business benefits, too. Understand why PCI compliance is important.
Read More3 Challenges of the New FTC Safeguards Rule
The new Safeguards Rule has nine elements that companies must complete. Here are three requirements that will be challenging for organizations to meet.
Read MoreSecuring Exchange Server: 8 Best Practices
Microsoft Exchange Server can be extremely vulnerable. Familiarize yourself with Exchange Server best practices to secure them against attacks.
Read MoreBlumira Achieves Service Organization Control (SOC) 2 Type 2 Certification
Blumira is officially SOC 2 Type 2 certified. Learn how Blumira helps customers meet compliance requirements, too.
Read More