If you’re a Microsoft migration and security partner looking to enhance your cyber resilience and migration strategies, mark your calendar for the first-ever TEC European Partner Summit. Taking place 28-29 November, 2023 in Barcelona, this summit…
If you’re a Microsoft migration and security partner looking to enhance your cyber resilience and migration strategies, mark your calendar for the first-ever TEC European Partner Summit. Taking place 28-29 November, 2023 in Barcelona, this summit…
The UK Telecommunications (Security) Act 2021 recognises the vital role that telecommunications plays in the modern world. Indeed, the government intends to quickly and dramatically expand the availability of gigabit-capable broadband and full fibre coverage…
The average cost of a data breach by cybercriminals is $3.86 million, according to recent cybersecurity reports. Cyberattacks have only increased in frequency since the pandemic hit last year, with cyberattack records growing by 224% year-over-year and…
It is well known for anyone who tried to run a VM in the cloud that RDP port if left opened will be attacked with massive waves of brute-force attempts from IPs all around the world.
I run a detection lab in Azure and at some point, it just started to…
In my previous blog post, I explored the first step in mitigating the insider threat — understanding and controlling privilege across the environment — and reviewed how Quest Enterprise Reporter Suite, Security Explorer and Change Auditor
…What images does the phrase “insider threat” conjure up in your mind? A disgruntled admin actively sabotaging your systems just before penning a resignation letter? A highly privileged contractor installing spyware that will keep exporting sensitive data…
Has your company been hit by ransomware yet? How about other types of malware? Phishing scams, drive-by downloads or pass-the-hash attacks? If you haven’t already, you probably will be soon.
What do all these attacks have in common? They start…
Currently 30% of companies in the United States are using the NIST Cybersecurity Framework to manage risks with projections of 50% by the year 2020 (https://iapp.org/news/a/the-future-of-the-nist-cybersecurity-framework/).
Quest has a broad portfolio…
We just released a new three-minute video that shows how you can monitor, detect and mitigate attacks happening using PowerShell commands.
PowerShell became very popular among penetration testers and hackers recently. Why I know this? Because it's in the…
Ladies and Gentlemen, let me introduce to you a malicious USB cable. You probably met him during your last corporate conference in that nice hotel lobby... I'm kidding of course, or am I?
https://twitter.com/_MG_/status/949684949614907395
I have a…