We are sorry, the event "Les neuf menaces d’origine interne les plus fréquentes et comment les détecter" has already expired.
Explore the native options for configuring, securing and auditing your OneDrive for Business environment, and their limitations.
Nearly 1/3 of the companies implementing Office 365 plan to use a less expensive plan in conjunction with more robust tools for security and management.
Your Active Directory (AD) security is constantly in a state of change, making it difficult to understand your risks from static reports alone. That’s why you need to actively monitor all changes made in AD — being able to detect suspicious activity and a
Changes in your AD environment can be indicative of a breach, leaving it unreliable. Explore AD security investigation and recovery plan best practices.
Unless you’ve been hiding under a rock, it’s going to come as no surprise that Office 365 adoption is increasing rapidly. With primary drivers like Exchange Online, SharePoint Online and OneDrive, Office 365 is obtaining an average of around 1 million new
Get this year's review for cyber attacks, from the totally new spectre & meltdown to pathetically old flash. There's plenty to learn from 2018.
Data breaches, threats and loss of data is at an all-time high. In 2017 the number of data breaches hit an all-time high, a drastic 44.7% increase over the 2016 record, according to the 2017 Data Breach Year-End Review by the Identity Theft Resource Cente
Now that the General Data Protection Regulation (GDPR) is here, are you ready to report on your GDPR compliance? If you’re not compliant, the enforced punitive measures, negative publicity and headlines could be far more damaging than the highly-publicize