What is an air gap backup? Is it necessary?
Learn about the types of air gaps you can use to reduce your attack surface and eliminate the ransomware attack vector targeting backups.
Learn about the types of air gaps you can use to reduce your attack surface and eliminate the ransomware attack vector targeting backups.
Pass the hash attack is a decades-old technique used by cybercriminals. Learn how it works and how to defend against it.
Every organization needs a solid ransomware recovery strategy to combat the potential devastation of ransomware attacks. Here are a few best practices to get started.
Password spraying, credential stuffing, brute force attacks—the similarities extend beyond their names. Learn how they work and how to prevent them.
Active Directory security groups play a critical role in controlling access to your vital systems and data. Learn how they work.
Endpoints are always the entry point for data breaches. Learn 7 endpoint security best practices that can help successfully reduce your risk.
Authentication is a critical component of security. Learn how SQL Server authentication works and how it differs from Windows authentication.
Learn about Kerberos authentication vulnerabilities and how to mitigate your risk
NTLM authentication helps determine if a user accessing an IT system is who they claim to be. Learn how it works and why it can present risks.
Quest experts predict the trends for next year, and all agree that a key theme will be overcoming the IT talent shortage. Check out our top 9 predictions.
Discover the essentials of multifactor authentication (MFA): its definition, available technologies, and the pros and cons of each.
Learn why unified endpoint management plays a significant role in helping you fortify against the top three ransomware attack vectors.