How-Tos

email popup warning window phishing cybersecurity security
Conceptual image of a network labeled 'Zero Trust.'

cloud technology protection information cybersecurity indentity

Defending against attacks on Azure AD: Goodbye firewall, hello identity protection

Gone are the days when a good firewall was key to keeping attackers out of a network. Azure Active Directory users need to know the new weak spots in identity authentication and protection and how to mitigate attacks.

log logs computer monitor screen cursor menu pc menu

How to enable event collection in Windows Server

SIEM and SOAR allow enterprises to collect and correlate log event data but may not be the ideal choice for every organization. Microsoft’s Windows Event Forwarding aggregates system event logs from disparate systems.

A digital hub marked with crossed wrench and screwdriver branches circuits through a system.

How to reset a Kerberos password and get ahead of coming updates

If you haven’t already, now is the time to reset your Kerberos password — take proactive action to ensure that you are one step ahead and prepared nearly a year in advance of future hardening.

mobile banking / financial network security / secure transactions/  bank card / credit card

PCI DSS 4.0 is coming: how to prepare for the looming changes to credit card payment rules

New credit card payment processing rules will tighten security and offer more flexibility for enterprises. While they won’t come into full effect until 2025, experts say there are significant changes and recommend that consumer-facing...

password

How to securely manage LAPS on a Windows network

Microsoft’s Local Administrator Password Solution (LAPS) enables local admin passwords to be set, reset and validated periodically. Here is how to make the best use of LAPS.

Businessman looks for the malicious code of a virus

How to update your Windows driver blocklist to keep malicious drivers away

An investigation revealed that Microsoft’s malicious driver blocklist wasn’t updating as expected. Here’s how to make sure you’re not letting bad actors gain access to your system through these carefully crafted attack tools.