DataGroupIT
  • Solutions
  • Products
  • Managed Services
  • About Us
  • Events
  • Blog
  • Contact
Select Page
Multi-factor authentication offers effective security, but not all solutions are created equal

Multi-factor authentication offers effective security, but not all solutions are created equal

by siteadmin | Oct 27, 2020 | Cloud Security, User Security

Reports published by Proofpoint recently documenting MFA vulnerabilities in Microsoft 365 (Office 365) have likely caused concern among Microsoft customers. The report cites “critical vulnerabilities in multi-factor authentication (MFA) implementation in cloud...
Increase SSO security by going passwordless

Increase SSO security by going passwordless

by siteadmin | Oct 27, 2020 | Cloud Security, User Security

The acceleration of digital transformation initiatives to support the remote workforce has, in turn, sped up the development of cloud-based applications. An average employee uses 36 cloud services at work according to McAfee, and accessing those applications requires...
5 Best Practices for Securing Privileged Access and Identities for the Cloud Management Console

5 Best Practices for Securing Privileged Access and Identities for the Cloud Management Console

by siteadmin | Oct 27, 2020 | Cloud Security, User Security

Over the next few weeks, we’ll explore best practices for securing privileged accounts and identities in common cloud scenarios. This series can help guide effective risk reduction strategies for today and for the future as cloud workloads evolve. First up, we’re...
AI email security: Understanding the human behind the keyboard

AI email security: Understanding the human behind the keyboard

by siteadmin | Oct 27, 2020 | User Security

At the heart of any email attack is the goal of moving the recipient to engage: whether that’s clicking a link, filling in a form, or opening an attachment. And with over nine in ten cyber-attacks starting with an email, this attack vector continues to prove...
Notice the unnoticed: Threat Hunting by SandBlast Agent

Notice the unnoticed: Threat Hunting by SandBlast Agent

by siteadmin | Oct 27, 2020 | User Security

By Yaelle Harel and Boaz Barzel Threat Hunting is a proactive approach for finding and remediating undetected cyber-attacks. It is a process that involves searching for indicators of compromise (IoC), investigating, classifying, and remediate. Threat hunting can be...
« Older Entries
Next Entries »

Recent Posts

  • Bridging the Gap Between Privileged Access Management & Identity Management
  • The CIPC hack and what it means for South African companies
  • Fortifying Kenya’s Digital Frontier: Navigating the Evolving East African Cybersecurity Landscape
  • Nigeria’s Cyber Security Battleground: Inside the Rise of Ransomware and AI-Powered Scams
  • Navigating the Evolving Cybersecurity Landscape with AI

Recent Comments

    Solutions

    User
    Data
    Network
    Application
    Mobile
    Cloud
    Products

    Company

    About us
    Our clients
    Our team
    Careers

    Connect

    info@datagroupit.com
    Send us a message

    • Follow
    • Follow

    ©2020 DataGroupIT. All rights reserved.  |  Privacy Policy  |  web design by: creative engineering studio