Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

September 2020

Understanding how attackers move inside your organization

Cyberthreats have been coming at us from the left, right, and center. The number of cyberattacks is forever on the rise, and companies need to keep ramping up their security measures to protect themselves. It’s important that these measures cover every aspect of a network environment. To understand why monitoring your whole environment is so important, let’s take a look at what an attacker might do once they get inside your organization.

Advanced Active Directory attacks: Simulating domain controller behavior

There was a time when cyberattacks on identity and authentication infrastructures [like Active Directory (AD)] were immensely challenging to perform. A lot of forethought had to be put into devising a plan for the careful execution of attacks, and advanced technical knowledge of domains and networks was a requisite. Over time, with the advent of open-source pen testing tools, the knowledge gap and the complexities involved to carry out a full-scale cyberattack have narrowed drastically.

Leveraging behavior analytics and machine learning algorithms in your PAM strategy

Modern technologies like machine learning (ML) algorithms can introduce a forward-thinking outlook to privileged access management (PAM) and enable enterprises to predict emerging access risks in real time. ML-based anomaly detection systems can deeply analyze raw data collected around privileged activity, profile standard user behavior patterns, and then surveil future operations to detect any deviations from the norm, such as server logins after office hours.

How to ensure network compliance in this era of remote work: The ITOM Podcast [Episode 5]

The ITOM Podcast returns with yet another episode to help you eliminate all the remote work woes in your IT environment. In the last episode, we discussed in detail about the key areas enterprises need to monitor to ensure endpoint security, measures to adopt to ensure cybersecurity while rolling out BYOD policies, and the crucial factors that IT leaders need to know about in the post-pandemic era with respect to IT security.

How to defend your IT assets while implementing BYOD policies: The ITOM Podcast [Episode 4]

Gear up! The ITOM Podcast is back with an all new episode intended to help you surmount all your remote work challenges in an IT environment. In the last episode, we discussed VPN monitoring in detail, the challenges encountered while monitoring VPNs, and the key metrics to track to overcome those challenges. This week, we will deep dive into endpoint security and BYOD policies.