Read the latest blog posts
    • 19 Sep 2017

    How to protect against AD security breaches and insider threats? Find out at Microsoft Ignite!

    Remember Hank the Hacker ? Hank is a fictional character we created for a recent webcast series around Active Directory security best practices. Hank represents hackers that appear in many shapes and sizes and who love to exploit the security limitations of AD, Azure AD and Office 365 . Hank the Hacker will send cyberattacks on your email, he’ll block login access with ransomware, he’ll use pass-the-hash techniques...
    • 19 Sep 2017

    How to configure Foglight to run as a daemon on a Unix Machine?

    Once you installed Foglight on a Unix machine, you might want the Foglight processes to start/stop automatically when you reboot the machine. This is not difficult to do and the Foglight installation includes already init.d-styled scripts which can be used. As Unix machines are often customized, the scripts are model scripts and provide the basic required functionality. You might need to customize the scripts further...
    • 19 Sep 2017

    Virtualize Oracle Databases like an Oracle ACE

    Imagine a world where your system administrator provisions a fully functional Linux server that’s patched with all the up-to-date kernel parameters, device drivers and configurations in just one hour. Come on. For real? Yep. Now imagine this: ...
    • 18 Sep 2017

    Detecting Active Directory breaches: How to Focus on the Needles and Not the Haystacks

    One thing is for certain – security has never been so scrutinized and publicized as it has these last few years. IT security spending is the highest it has ever been and yet cyberattacks, and the stolen company and customer data that follows, continues to dominate headlines. Just this month as many as 143 million customers were affected by the breach at credit reporting agency Equifax. The worldwide economic impact...
    • 18 Sep 2017

    The Top Five Oracle OpenWorld Sessions

    With so many of the world’s biggest names in IT speaking at Oracle OpenWorld , you have the opportunity to vastly expand your knowledge. But with a whopping fifty speaking sessions to choose from, where do you even begin? Relax. We’ve got...