Organizations exist either to generate revenue or to perform a service. The mere thought of securing an environment doesn’t exist until there is something of value to secure. Once you have gotten to that stage of an organizational lifecycle, people…
Organizations exist either to generate revenue or to perform a service. The mere thought of securing an environment doesn’t exist until there is something of value to secure. Once you have gotten to that stage of an organizational lifecycle, people…
Encrypting Ransomware is a family of malicious software (also known as malware) designed to take files on a PC or network storage device, encrypt them, and then extort money in the form of a ransom to unlock the files. This sophisticated type of attack…
Moving data between servers can be a painful process because of the security involved over the data. Moving the same data between servers, which are in different domains, is even more troublesome. Trying to move data between forests/domains which are…
This second blog in a series on the impact of GDPR on IT operations examines the IT requirements specified in or implied by the new regulation.
There are three main areas that IT operations must focus on in order to facilitate an organisation's compliance…
Change Auditor now supports Client Certificate Authentication. This is a welcome feature for administrator who prefer a more secure method of Authenticating users connecting with the web client. Introducing Client Certificate Authentication in the client…