Category: Vendor News

Microsoft Teams and OpManager: The perfect team for your remote IT management game

It seems almost everything is going digital during this pandemic: businesses, education, and medical consultations. This increased digital consumption is squeezing the juice out of the IT infrastructure of many organizations. On top of that, remote work policies are posing serious security issues. At times like these, IT infrastructure monitoring is like a football game […]

Five worthy reads: The evolving employee experience

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore how the employee experience is evolving with the new normal. The employee experience (EX) isn’t about ping pong tables or bring-your-pet-to-work days anymore. The new normal of working remotely has brought in […]

Are you listening to your logs? Part 4: Open Ports

Did you know that an organization with more open ports is more vulnerable to data breaches? In the first, second, and third parts of the Are you listening to your logs? series, we saw how logs can be used to detect security and operational issues in a network. In the final blog, we’ll talk about […]

Are you listening to your logs? Part 3: High disk usage

In the previous blog of this series, we saw how server crashes can be avoided by detecting low disk space in time using logs. In this blog, we’ll talk about another server metric, disk usage, and how it can be linked to cryptojacking. Unlike the percentage of used disk space, disk usage refers to the […]

Organizations Working From Home Opens Wider Target for Cybercriminals

With so many people working from home, more attackers are adapting their strategies to focus on employees as a way to bypass organizations’ defenses, FCW reports. During a webcast hosted by Venable, several Federal and industry experts discussed the challenges associated with remote work, particularly in organizations that previously required physical modes of identification. Sean […]

Are you listening to your logs? Part 2: Low disk space

In the first part of this blog series, we saw how monitoring slow server response times in your network can help detect denial-of-service (DoS) attacks. In this blog, we look at how logs can detect an operational issue such as low disk space in your Windows servers. Disk space, also known as disk capacity, refers […]

Are you listening to your logs? Part 1: Slow server response

Loading… Is there a more uninspiring word to encounter while browsing the internet? When a loading screen occurs, statistics show it takes only three seconds for a potential customer to leave your website. Are you listening to your logs? is a blog series that aims to explore logs for insights into potential security and operational […]

Why following NIST guidelines will strengthen your SIEM framework

The National Institute of Standards and Technology (NIST) is a federal, non-regulatory agency funded by the United States Department of Commerce. It aims to provide security guidelines, quality standards, and more for various industries. NIST publishes a cybersecurity framework that many organizations adhere to while creating their identity and access management (IAM), or security information […]

Crowdstrike: “More Cyberattacks in the First Half of 2020 Than in All of 2019”

According to a recent study conducted by cybersecurity firm CrowdStrike, recent threat activity throughout its customers’ networks has shown more intrusion attempts within the first half of 2020 than in all of 2019. This may be due to the pandemic and subsequent lockdown measures forcing employees to mass shift to teleworking. This may also be […]