Operations | Monitoring | ITSM | DevOps | Cloud

Latest Publications

Top 3 workstation logs to monitor: Improve endpoint security with Sysmon, PowerShell and security logs

Most cyberattacks today begin on user workstations. Why? Well, in part it's because workstations, unlike servers, are typically the province of non-technical users, who are easier prey for attackers. It's easy to lay all the blame on users, but attacks are getting more sophisticated all the time. The other side of the coin is that users' workstations are also particularly vulnerable, for several reasons.

Integrated change auditing and event log management for strong security

Complete, reliable user activity tracking is essential to both security and compliance. But using native tools means struggling with an avalanche of uncorrelated, cryptic event activity from individual DCs, servers and more, and most third-party tools are cumbersome to implement and don't provide the depth of auditing required.

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud

Organizations today are increasingly the targets of sophisticated threats developed by a shadowy and well-financed cybercrime industry that has demonstrated it can often outsmart even the most robust security defenses. Worse yet, cybercriminals are aided by the fact that security teams often lack the human and financial resources necessary to keep pace with evolving threats, so they often cannot defend against every attack coming their way.