SolarWinds Access Rights Manager Review
If you’re an admin, you’re likely already familiar with SolarWinds and its array of highly rated products suited for just about every aspect of IT management. But you might not be familiar with SolarWinds® Access Rights Manager (ARM). This software exists because it’s critical for you to manage and audit access rights across the system—the … Read more SolarWinds Access Rights Manager Review
10 Best Free and Open-Source SIEM Tools
A successful SIEM strategy is an investment—and sometimes costly. Managing SIEM is a resource-intensive process, requiring ongoing evaluations and adjustments to establish and maintain optimal performance. Despite this, going without a SIEM solution isn’t the answer, because this can leave you vulnerable to attack. Open-source SIEM and free SIEM tools can seem like the solution. … Read more 10 Best Free and Open-Source SIEM Tools
3 Reasons Why IT Isn’t Managing Permissions (Even Though They Should)
The core of your organization’s security stance is built on a massive number of individual permissions to both on-premises and cloud-based resources. With the increase in cyberattacks, concerns around insider threats, and the growing need to meet multiple compliance mandates centered around data security of various types of data, it seems like permissions should be … Read more 3 Reasons Why IT Isn’t Managing Permissions (Even Though They Should)
8 Best FTP Clients for macOS and Windows
My point here is this: every IT professional and practitioner needs a good FTP client (and possibly server) in their corner. Whether you’re building a site or sharing files, FTP provides ease and capacity unavailable in simple computer-to-computer transfers. The popularity and long history of this protocol means there are lots of players in the … Read more 8 Best FTP Clients for macOS and Windows
Top 10 Active Directory Service Accounts Best Practices
With Windows Active Directory, a range of different account types can be set up with the necessary permissions, access, and roles. These include service accounts, which are intended for use when installing applications or services on the operating system. Common types of Active Directory service accounts include built-in local user accounts, domain user accounts, managed … Read more Top 10 Active Directory Service Accounts Best Practices
4 Ways Cyberattackers Take Advantage of Mismanaged Permissions
If we’ve learned nothing else about cybercriminal organizations over the last few years, we know for certain these folks are experts on Microsoft security. They’re no longer simply opportunistically gaining access to your network; instead, they’re leveraging known vulnerabilities in operating systems and applications and using the very network they’ve compromised to assist them in finding their intended target … Read more 4 Ways Cyberattackers Take Advantage of Mismanaged Permissions
Top 6 Active Directory Security Groups Best Practices
Active Directory is essentially a registry containing all the information about a network, including users, groups, computers and printers, and servers. Each of these things, whether physical or virtual, is considered an “object” in Active Directory, and has various attributes assigned to it, such as a name, number, or group membership. Active Directory is used … Read more Top 6 Active Directory Security Groups Best Practices
RBAC vs. ABAC: What’s the Difference?
In any company, network users must be both authenticated and authorized before they can access parts of the system capable of leading to security breaches. The process of gaining authorization is called access control. In this guide, I discuss the two main methods for managing access control for your systems—role-based access control (RBAC) and attribute-based … Read more RBAC vs. ABAC: What’s the Difference?
3 Ways Your Permissions Are in Worse Shape Than You Think
IT is really busy these days. In fact, IT’s been busy for as long as you can remember. Security issues today alone could keep you busy full-time, but there’s just not enough time in the day. Strategic initiatives and fires seem to take precedent daily, pushing some of the more necessary, but rudimentary, parts of … Read more 3 Ways Your Permissions Are in Worse Shape Than You Think
How to Create a Security Group in Active Directory
Active Directory (AD) is a battle-tested software many company administrators use as a standard remedy for concerns about outsider access to data. But within AD, there are many types of security protocols to choose from. What if I don’t want to enable email access to my users, but instead I want my users to securely … Read more How to Create a Security Group in Active Directory