Windows Server Update Services has been around for a long time and is the tool many administrators rely on to manage Windows updates. Windows Update for...
Category - Security
A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage. Cyber attacks...
On January Patch Tuesday, Microsoft plugged a critical zero-day exploit in Microsoft Defender that administrators should check to ensure the automatic...
Historically, remote sites were connected by legacy telecom circuits, which connected to a corporate data center, which then connected to the internet...
2020 was a tough year for cybersecurity. Security teams had to secure remote work environments in a matter of days as the COVID-19 pandemic triggered...
The technology answers to most remote work and education requirements have one word in common: virtual.
While many technologies touted virtual...
It is tempting to think that securing SaaS is fundamentally about users accessing the web. But, upon closer inspection, keeping SaaS use secure is much...
Cybersecurity career paths have become more formal over the years as security incidents have increased and the skills required to keep companies safe...
By
Each employee of a business, from end users to security professionals to executives, has a role in protecting their business from cyber attacks. The...
Interviewing for a job in information security can be daunting. There are so many topics candidates are expected to know: DNS monitoring, distributed...