NIST CSF 2.0: What you need to know
Explore the upcoming NIST CSF 2.0 revision to the Cybersecurity Framework from the U.S. National Institute of Standards and Technology.
Explore the upcoming NIST CSF 2.0 revision to the Cybersecurity Framework from the U.S. National Institute of Standards and Technology.
Gain insights into cyber risk insurance, understand qualification criteria, and explore strategies to reduce your insurance premiums.
Learn what the succession plan for future Active Directory admins should look like ahead of the retirement boom of more experienced admins.
Learn the most common Active Directory attacks, how they unfold and what steps organizations can take to mitigate their risk.
Pass the hash attack is a decades-old technique used by cybercriminals. Learn how it works and how to defend against it.
When I started out as a system admin, I wish I’d had a cheat sheet to help me keep track of everything I needed to take care of for each of my endpoints. Now, after years of experience, I’ve decided t...
Myths are cool. I heard a lot of myths and legends as bedtime stories when I was growing up, then studied them for years in high school and college. But nowadays, most of the myths I hear are about en...
Software updates and patch management got you down? Seems like new ransomware, malware and viruses lurk around every corner these days, and software companies are releasing patches in swarms to keep u...
I read all sorts of security blogs, and the comments I see to articles about staying ahead of the latest Windows OS and third-party security updates attest to the challenge of keeping systems up to da...
After a decade of working in the regulated banking and finance industry, I now spend my days helping Quest customers improve their layered defense strategies. Unfortunately, eight out of ten of the cu...