Unfolding the Twitter security incident

Unfolding the Twitter security incident

In case 2020 wasn’t dystopian enough, here’s some more unbelievable news. On July 15, 2020, social media giant Twitter admitted it fell victim to a security breach. The attackers targetted 130 Twitter... Read more »
What do we talk about when we have password problems?

What do we talk about when we have password problems?

Chat 1 Employee 1: Hi, admin. Employee 1: I forgot my password. Can you reset it for me? I’ve raised a ticket too. IT admin: *sigh* Chat 2 Employee 2: Hello, admin.... Read more »
How to choose the right compliance management software for your business

How to choose the right compliance management software for your business

While keeping data safe from modern cyberthreats is difficult enough, you also have to keep in mind compliance with common regulations, i.e., ensuring your company’s compliance to SOX, which deals with transparency... Read more »
IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance

IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance

Cyberattacks are a growing threat, and organizations are investing time and money in security strategies to make certain that their infrastructures are secure. Active Directory (AD) is a constant target for compromise,... Read more »