www.lepide.com HTML Site Map
Last updated: 2024, December 27 06:19:36
Total pages: 1671
www.lepide.com Homepage
1
2
/
31 pages
Lepide | Prevent Unstructured Data from Getting Breached
Lepide Support
Lepide | Supported Platforms
Lepide | About Us | Our Vision and Mission
Prestigious Clients
Case Studies - Success Stories of Lepide Solutions
Contact Us | Lepide
Lepide Partner Reseller Program
Become an Authorised Partner of Lepide
Tell us about a new opportunity
Lepide Alliance Partnerships
Product Documentation Center for Lepide Solutions
Lepide Datasheets: Audit and Security Solutions
CISO Talks | The Information Security Podcast from Lepide
Lepide – Meet The Team
Awards & Reviews
Lepide Privacy Policy
terms-and-conditions.pdf
customer-contract-and-license.pdf
www.lepide.com Site Map, Page 1 - Lepide | Prevent Unstructured Data from Getting Breached. Generated by www.xml-sitemaps.com
sitemap.xml
Lepide Professional Services
Request a Quote for Lepide Data Security Platform
Request a Demo for Lepide Data Security Platform
In-Browser Demo | Lepide Data Security Platform
Schedule a Free Data Risk Assessment with Lepide
www.lepide.com Site Map, Page 2 - Lepide | Prevent Unstructured Data from Getting Breached. Generated by www.xml-sitemaps.com
risk-assessment-sample.pdf
Feedback
Lepide Knowledgebase and Freeware
Lepide’s Latest Media Coverage and Press Interviews
customerportal/
3 pages
Log in » Lepide Customer Portal
» Lepide Customer Portal
Lost password » Lepide Customer Portal
data-security-platform/
41 pages
Lepide Data Security Platform – Protect Sensitive Data & Meet Compliance Mandates
AI Security with Lepide
DSPM Solution | Data Security Posture Management
Detect and Prevent Data Breaches with Lepide
Data Access Governance Software from Lepide
Ransomware Protection Solution – Protect Against Ransomware
Insider Threat Detection and Prevention with Lepide Data Security Platform
Active Directory Security Tool from Lepide
Microsoft 365 Security with Lepide
Powerful Data Loss Prevention Software: Protect Your Data
Secure Your Data in Cloud | Lepide Data Security Platform
Remote Worker Monitoring with Lepide Data Security Platform
Detect Compromised Users | Lepide Data Security Platform
See How Lepide Data Security Platform Works
Ransomware Detection and Prevention with Lepide Data Security Platform
Active Directory Cleanup Tool - Manage Inactive AD Users
Implementing Zero Trust with Lepide
Active Directory Password Expiration Notification Tool – Lepide
Powerful Privileged Management Solution: Secure Your Access
Restore Deleted Active Directory Objects with Lepide
Rollback Active Directory and Group Policy Changes
Session Recording with Lepide Data Security Platform
Monitor the Health of Active Directory, Exchange and SQL Server
Lepide Data Security Platform Mobile App
Release History – Lepide Data Security Platform
report-on-administrative-group-changes.pdf
troubleshoot-account-lockouts.pdf
remind-users-to-reset-their-passwords.pdf
manage-inactive-users-in-ad.pdf
identify-users-with-admin-privileges.pdf
restore-objects-in-active-directory-with-lepide.pdf
how-to-report-and-alert-on-files-being-copied.pdf
use-lepide-to-identify-users-with-excessive-privileges-to-sensitive-data.pdf
how-to-use-lepide-to-detect-and-respond-to-ransomware.pdf
Lepide - SIEM (Security Information and Event Management) Integrations
Active Directory Health Monitoring Tool – Check AD Health
Introducing Lepide Data Security Platform 23.1
Introducing Lepide Data Security Platform 22.1
Digital Transformation with Lepide
Enterprise Scalability and Performance with Lepide Data Security Platform
Reduce Attack Surface Area | Lepide Data Security Platform
lepideauditor/
34 pages
Lepide Auditor | Change Auditing and Reporting Software
Active Directory Auditing Tool - Audit & Report AD Changes
Azure AD (Entra ID) Auditing and Reporting Tool
Exchange Auditing Tool to Track and Report Changes - Lepide
Microsoft 365 Auditing Tool | Audit Office 365 Changes with Lepide
MS Teams Auditing Tool | Monitor User Activities | Lepide
Google Workspace (G Suite) Auditing and Reporting Tool
Windows File Server Auditing Software to Audit and Report Changes
NetApp Filer Auditing and Reporting Tool | Lepide Auditor
Dell EMC Data Storage Auditing and Reporting Tool
Nasuni Auditing and Reporting Solution from Lepide
SharePoint Auditing Tool to Track & Report Changes – Lepide
SQL Server Auditing Tool | Lepide Auditor
Audit Amazon Web Services (AWS) S3 Buckets with Lepide Auditor
Dropbox Auditing and Reporting with Lepide Dropbox Auditor
Group Policy Auditing Tool | Lepide Auditor
Audit Any On-Premise or Cloud Platform with Lepide Data Security Platform
Track Active Directory Changes in Real Time with Lepide AD Auditor
Active Directory Change Auditing & Compliance Reporting
AD User Login History Reporting with Lepide Auditor
Active Directory Permission Auditing, Track Permission Changes with Lepide AD Auditor
Active Directory Monitoring Tool: Enhance Performance and Security
Exchange Monitoring and Reporting Tool from Lepide
Microsoft Office 365 Reporting Tool from Lepide
OneDrive for Business Auditing and Reporting with Lepide Data Security Platform
NTFS Permissions Reporting Tool from Lepide
File Copy Monitoring Software | Audit File Copy Events
Track File Server Changes with Lepide File Server Auditor
File Share Auditing with Lepide File Server Auditor
File Access Monitoring and Auditing Tool | Lepide Auditor
Group Policy Change Reporting with Lepide Group Policy Auditor
Track Group Policy Changes with Lepide Group Policy Auditor in Real Time
File Activity Monitoring Software | Lepide Auditor
Permission Change Analysis of Active Directory, Exchange and File Servers with Lepide Data Security Platform
lepide-trust/
3 pages
Lepide Trust | Analyze Permissions and Implement Zero Trust
Permissions Analysis Solution
Risk Analysis for Identities and Data
lepide-detect/
3 pages
Threat Detection and Response Solution
Real Time Threat Detection Solution
Real Time Threat Response Solution
lepide-protect/
1 page
Permissions Management and Data Access Management Software – Lepide Protect
lepide-iq/
1 page
Lepide IQ – AI-powered Security Analytics
lepide-identify/
3 pages
Lepide Identify | Data Classification & eDiscovery
Data Classification Software: Discover Sensitive Data – Lepide
Lepide eDiscovery Solution for Faster DSAR Response
compliance/
11 pages
Meet Compliance Regulations with Lepide
CMMC Compliance Solution | Lepide
Meet GDPR Compliance Audit Mandates with Lepide
CCPA Compliance Audit Software from Lepide
Pass CJIS Compliance Audits with Lepide
Meet HIPAA Compliance Audit Mandates with Lepide
Meet PCI Compliance Audit Mandates with Lepide
Meet FISMA Compliance Audit Mandates with Lepide
Meet GLBA Compliance Audit Mandates with Lepide
Meet SOX Compliance Audit Mandates with Lepide
ISO 27001 Compliance | Lepide
use-cases/
1 page
Lepide Use Cases
webinar/
43 pages
The Lepide Data Security Platform – A Guided Tour
Lepide Webinars
Webinar - A New Approach to Protect Your Sensitive Data
Webinar - A Roadmap to Implement Zero Trust Security
Webinar - Generative AI Security Risks and How to Overcome Them
Webinar - Lepide Guide to Effective Data Access Governance
Webinar - Lepide Guide to Ransomware Detection and Response
Webinar - How to Effectively Audit File Server for Data Protection and Compliance
Webinar - Lepide Guide to Active Directory Security
Webinar - Using Lepide to Detect Threats, Protect Data, and Meet Compliance
Webinar - Data Protection Strategies to Adopt This Year
How to Enable Lepide for Privileged Access Management - Recorded Webinar
Webinar – How to Better Understand Your Privileged Users in Active Directory
How to Enable Lepide for Compliance - Recorded Webinar
A Complete Guide to the NIST Cybersecurity Framework - Recorded Webinar
How to Enable Lepide for Data Breaches - Webinar
How to Enable Lepide for Data Loss Prevention - Webinar
How to Enable Lepide for Digital Transformation - Webinar
How to Enable Lepide for Data Access Governance - Webinar
Webinar - The Complete Guide to Ransomware
Webinar - The Lepide Guide to Essential Penetration Testing Techniques
Webinar - Common Causes of Account Lockouts in AD and How to Troubleshoot
Top Security Events to Monitor in Microsoft 365 - Webinar
Active Directory and Windows Infrastructure as a Malware Tool - Webinar
Executive's Guide to the Business of Malware - Webinar
Lepide (powered by tenfold) Live Demonstration
How to Detect Threats to Data Security and Better Govern Access | Webinar
Webinar | The New US Data Privacy Environment: Are You Ready?
A Four Step Roadmap to Complying with the GLBA Safeguards Rule
Four Secrets of US HIPAA Compliance | Lepide Webinar
Webinar – How to Improve Your Data Security By Addressing the Insider Threat
Webinar –How to Protect Sensitive Data Whilst Using Microsoft Teams
Webinar – Learn How to Be Cyber-Smart for This Year's Cybersecurity Awareness Month
Webinar – Is "Zero Trust" the Magic Bullet for Data Security?
Webinar – Is "Trust but Verify" the Most Important Security Strategy?
Webinar – How to Detect and Respond to a Ransomware Attack
Webinar – How to Build a Business Case for Information Security
Webinar – How to Deal with the Rise of Security Threats Affecting Your Sensitive Data
Webinar – Why Your Legacy Security Will Fail to Protect Against Home Workers
Webinar – How to Implement Zero Trust with Remote Workers
Webinar – How to Keep Track of What Remote Workers Are Doing with Your Sensitive Data
Webinar – How to Maintain Data Security and Productivity with Remote Workers
Webinar – A Security Debate Zero Trust or Trust but Verify
news/
1 page
Latest News and Updates – Lepide Software
lepide-unveils-version-24-3-of-its-data-security-platform/
1 page
Lepide Unveils Version 24.3 of its Data Security Platform
category/
announcement/
1 page
Announcements Archives - Latest News and Updates - Lepide Software - Latest News and Updates – Lepide Software
new-launch/
1 page
New Launches Archives - Latest News and Updates - Lepide Software - Latest News and Updates – Lepide Software
product-update/
1 page
Product Updates Archives - Latest News and Updates - Lepide Software - Latest News and Updates – Lepide Software
lepide-data-security-platform-version-24-2-luanched/
1 page
Lepide Extends the Coverage of its Award-Winning Data Security Platform to Dell EMC Isilon
lepide-data-security-platform-24-0-1-launched/
1 page
Lepide Data Security Platform 24.0.1 Deepens Data Security for Microsoft 365 Components
lepide-and-liverton-join-forces-to-enhance-data-loss-prevention/
1 page
Lepide and Liverton Join Forces to Enhance Data Loss Prevention Across Microsoft Exchange and Outlook
lepide-data-security-platform-version-23-1/
1 page
Lepide Data Security Platform Version 23.1 Sees the Web Console Move Out of Beta
lepide-joins-forces-with-spirion/
1 page
Lepide Joins Forces with Spirion to Enhance Data Security Posture Management
lepide-data-security-platform-22-1-makes-reporting-more-accessible-and-user-friendly/
1 page
Lepide Data Security Platform 22.1 Makes Reporting More Accessible and User-Friendly Through a Comprehensive Web Console
lepide-active-directory-self-service-22-1-released/
1 page
Further Improve the Security of Active Directory with Lepide Active Directory Self Service 22.1
lepide-statement-on-cve-2021-44228-the-apache-log4j-vulnerability/
1 page
Lepide Statement On CVE-2021-44228, The Apache Log4j Vulnerability
lepide-data-security-platform-21-2-introduces-a-brand-new-web-interface-for-reports/
1 page
Lepide Data Security Platform 21.2 Introduces a Brand New Web Interface for Reports
lepide-data-security-platform-21-1-now-scales-better-than-any-other-solution-in-the-market/
1 page
Lepide Data Security Platform 21.1 Now Scales Better Than Any Other Solution in the Market
lepide-announces-strategic-partnership-with-atakama-to-further-secure-sensitive-data/
1 page
Lepide Announces Strategic Partnership with Atakama to Further Secure Sensitive Data
lepide-data-security-platform-20-2-released/
1 page
Lepide Data Security Platform 20.2 – Improve the Security of Microsoft Teams
automatically-block-compromised-user-accounts-with-lepide-active-directory-self-service-20-1/
1 page
Automatically Block Compromised User Accounts with Lepide Active Directory Self Service 20.1
lepide-and-sherpa-announce-strategic-partnership/
1 page
Lepide and Sherpa Announce Strategic Partnership
find-out-what-your-data-is-really-worth-with-lepide-data-security-platform-20-1/
1 page
Find Out What Your Data Is Really Worth with Lepide Data Security Platform 20.1
lepideauditor-is-now-lepide-data-security-platform/
1 page
LepideAuditor Is Now Lepide Data Security Platform
lepide-introduces-data-risk-analysis-dashboard-to-easily-identify-risks-to-data-security/
1 page
Lepide Introduces Data Risk Analysis Dashboard to Help Organizations Easily Identify Risks to Data Security
lepide-introduces-universal-auditing-and-data-classification-for-exchange/
1 page
Lepide Introduces Universal Auditing and Data Classification for Exchange
lepide-grows-team-of-product-experts-in-the-usa/
1 page
Lepide Grows Team of Product Experts in the USA
lepide-releases-active-directory-account-lockout-examiner-freeware-and-three-other-free-tools-to-help-improve-data-security/
1 page
Lepide Releases Active Directory Account Lockout Examiner Freeware and Three Other Free Tools to Help Improve Data Security
lepideauditor-19-2-improves-upon-data-discovery-by-removing-false-positives/
1 page
LepideAuditor 19.2 Improves Upon Data Discovery by Removing False Positives
lepide-joins-forces-with-dutch-technology-experts/
1 page
Lepide Joins Forces with Dutch Technology eXperts to Provide Data-Centric Audit & Protection to the Benelux Region
on-the-fly-classification-introduced-into-lepideauditor-19-1/
1 page
“On the Fly” Classification Introduced into LepideAuditor 19.1
active-directory-self-service-19-0-introduces-a-new-and-improved-user-interface/
1 page
Active Directory Self Service 19.0 Introduces a New and Improved User Interface
lepideauditor-19-0-improves-further-on-data-discovery-and-classification-and-data-security-analytics/
1 page
LepideAuditor 19.0 Improves Further on Data Discovery and Classification and Data Security Analytics
track-users-and-objects-with-excessive-permissions-with-lepideauditor-18-7/
1 page
Easily Identify Users and Objects with Excessive Permissions with LepideAuditor 18.7
lepideauditor-now-includes-data-discovery-and-classification/
1 page
LepideAuditor Now Includes Data Discovery and Classification
lepidemigrator-for-exchange-moves-to-kernel/
1 page
LepideMigrator for Exchange moves to Kernel
lepideauditor-18-5-introduces-anomaly-spotting-to-improve-user-entity-behavior-analytics/
1 page
LepideAuditor 18.5 Introduces Anomaly Spotting to Improve User & Entity Behavior Analytics
lepideauditor-18-4-released/
1 page
LepideAuditor 18.4 Introduces a Brand-New Interactive Access Governance Insights Dashboard and G Suite Auditing
lepide-active-directory-self-service-version-18-1-released/
1 page
Lepide Releases Version 18.1 of Active Directory Self Service Solution with New Search Capabilities
lepideauditor-18-3-now-integrates-with-any-siem-solution-and-introduces-amazon-web-services-auditing/
1 page
LepideAuditor 18.3 now integrates with any SIEM Solution and Introduces Amazon Web Services Auditing
lepideauditor-18-1-now-audits-cloud-components/
1 page
LepideAuditor 18.1 Now Audits Dropbox, Azure AD and OneDrive for Business
lepideauditor-18-0-now-including-open-share-analysis/
1 page
Launch of LepideAuditor 18.0 – Now Including Open Share Analysis
launch-of-lepideauditor-17-5-4-now-with-integrated-data-discovery-and-classification/
1 page
Launch of LepideAuditor 17.5.4 – Now with Integrated Data Discovery and Classification
lepide-launches-active-directory-self-service-18-0/
1 page
Lepide Launches Active Directory Self Service 18.0: Now with Automated Script Execution
easily-meet-gdpr-compliance-with-lepideauditor-17-5/
1 page
Easily meet GDPR compliance with LepideAuditor 17.5
audit-sharepoint-online-with-lepideauditor-17-4/
1 page
Audit SharePoint Online with LepideAuditor 17.4
lepideauditor-17-3-with-netapp-cluster-mode-auditing/
1 page
Launch of LepideAuditor 17.3 – Now with NetApp Cluster Mode auditing
launch-of-lepideauditor-17-2/
1 page
Launch of LepideAuditor 17.2
lepide-exchange-recovery-manager-moves-to-kernel/
1 page
Lepide Exchange Recovery Manager moves to Kernel
lepide-active-directory-self-service-17-0-is-now-available/
1 page
Lepide Active Directory Self Service 17.0 is now available
lepideauditor-17-1-launched/
1 page
LepideAuditor 17.1 is now available
lepideauditor-suite-17-0-with-threshold-alerts-for-file-server-auditing/
1 page
Lepide launches LepideAuditor Suite 17.0 with brand new threshold alerts for File Server auditing
lepide-announces-launch-of-lepideauditor-suite-16-4-2/
1 page
Lepide announces launch of LepideAuditor Suite 16.4.2 with several exciting new features for easier auditing
lepideauditor-suite-v16-4-launched/
1 page
Lepide launches the new and improved LepideAuditor Suite 16.4
lepide-active-directory-self-service-version-16-2-launched/
1 page
Lepide Software release Lepide Active Directory Self Service version 16.2
lepide-appoints-distology-as-their-uk-distributor/
1 page
Lepide appoints Distology as their UK distributor to help them grow their channel in the region
lepide-has-a-new-logo/
1 page
Lepide has a new logo!
lepideauditor-suite-16-3-with-file-server-current-permission-reporting/
1 page
LepideAuditor Suite 16.3 now comes with File Server Current Permission reporting
lepide-active-directory-self-service-16-1-launched/
1 page
Lepide Software has launched Lepide Active Directory Self Service 16.1 with a couple of new features
auditor-suite-16-2-launched/
1 page
Auditor Suite 16.2 launched with Active Directory and Exchange Server Permission Analysis
lepideauditor-suite-16-1-launched/
1 page
LepideAuditor Suite 16.1 launched with File Server Auditor and Permission Analysis
lepide-active-directory-self-service-version-16-0-released/
1 page
Lepide Active Directory Self Service Version 16.0 Released
lepideauditor-suite-16-0-with-compliance-reports/
1 page
LepideAuditor Suite 16.0 with Regulatory Compliance Reports
lepide-active-directory-self-service-version-15-1-released/
1 page
Lepide Active Directory Self Service Version 15.1 Released
yet-another-new-release-to-the-lepide-auditor-suite-version-15-4/
1 page
Yet another new release to the LepideAuditor Suite version 15.4
lepideauditor-suite-15-3-launched/
1 page
LepideAuditor Suite 15.3 launched
major-new-release-of-auditorsuite-from-lepide/
1 page
MAJOR new release of AuditorSuite from Lepide
lepide-software-announces-release-of-lepideauditor-for-file-server-version-15-2/
1 page
Lepide Software announces release of LepideAuditor for File Server version 15.2
lepideauditor-suite-version-15-1-launched/
1 page
LepideAuditor Suite version 15.1 launched
lepide-software-announces-launch-of-new-version-15-2-of-the-lerm/
1 page
Lepide Software announces launch of new version (15.2) of the LERM
lepide-software-launches-upgraded-version-15-1-of-lepideauditor-for-file-server/
1 page
Lepide Software launches upgraded version 15.1 of LepideAuditor for File Server
lepide-software-launches-upgraded-version-of-lepide-active-directory-self-service-15-0/
1 page
Lepide Software launches upgraded version of Lepide Active Directory Self Service 15.0
lepideauditor-for-file-server-version-15-0-launched/
1 page
LepideAuditor for File Server version 15.0 Launched
lepideauditor-suite-15-0-launched/
1 page
LepideAuditor Suite 15.0 launched
lepide-active-directory-self-service-version-14-12-launched/
1 page
Lepide Active Directory Self Service Version 14.12 launched
lepide-active-directory-self-service-version-14-11-launched/
1 page
Lepide Active Directory Self Service Version 14.11 launched
lepide-sql-storage-manager-is-now-available-for-free/
1 page
Lepide SQL Storage Manager is now available for Free
lepideauditor-suite-is-launched/
1 page
LepideAuditor Suite is launched
lepide-software-launched-lepide-active-directory-self-service-version-14-06-01/
1 page
Lepide Software launched Lepide Active Directory Self Service version 14.06.01
lepideauditor-for-active-directory-version-14-06-01-launched/
1 page
LepideAuditor for Active Directory Version 14.06.01 Launched
lepide-software-launched-lepideauditor-for-file-server-version-14-05-01/
1 page
Lepide Software launched LepideAuditor for File Server Version 14.05.01
lepide-software-announces-the-launch-of-lepideauditor-for-sharepoint/
1 page
Lepide Software announces the launch of LepideAuditor for SharePoint
lepide-active-directory-cleaner-launched/
1 page
Lepide Active Directory Cleaner launched
lepide-user-password-expiration-reminder-version-14-05-01-launched/
1 page
Lepide User Password Expiration Reminder Version 14.05.01 launched
lepide-software-announces-the-launch-of-lepideauditor-for-exchange-server-14-05-01/
1 page
Lepide Software announces the launch of LepideAuditor for Exchange Server 14.05.01
lepide-software-announces-the-launch-of-lepideauditor-for-file-server-version-14-02-01/
1 page
Lepide Software announces the launch of LepideAuditor for File Server Version 14.02.01
lepideauditor-for-exchange-server-review-won-silver-award/
1 page
LepideAuditor for Exchange Server Review won Silver Award
lepideauditor-for-exchange-server-released/
1 page
LepideAuditor for Exchange Server released
lepideauditor-for-active-directory-version-13-07-01-launched/
1 page
LepideAuditor for Active Directory version 13.07.01 launched
readers-choice-award-from-msexchange-org/
1 page
Reader’s Choice Award from MSExchange.org
lepide-user-password-expiration-reminder-launched/
1 page
Lepide User Password Expiration Reminder Launched
lepideauditor-for-sql-server-launched/
1 page
LepideAuditor for SQL Server Launched
lepideauditor-for-active-directory-wins-gold-award-by-windowsnetworking-team/
1 page
LepideAuditor for Active Directory Wins Gold Award by Windowsnetworking Team
lepide-software-launched-lepideauditor-for-file-server/
1 page
Lepide Software launched LepideAuditor for File Server
lepide-active-directory-manager-version-12-12-01-launched/
1 page
Lepide Active Directory Manager Version 12.12.01 launched
lepide-software-launched-lepideauditor-for-active-directory/
1 page
Lepide Software Launched LepideAuditor for Active Directory
lepide-event-log-manager-updated-version-launched/
1 page
Lepide Event Log Manager Updated Version Launched
lepide-software-pvt-ltd-is-proud-to-announce-that-we-are-now-a-certified-partner-of-microsoft/
1 page
Lepide Software Pvt Ltd is proud to announce that we are now a certified partner of Microsoft
lepide-active-directory-self-service-version-12-09-01-launched/
1 page
Lepide Active Directory Self Service version 12.09.01 launched
lepide-remote-admin-launched/
1 page
Lepide Remote Admin Launched
lepide-last-logon-reporter-launched/
1 page
Lepide Last Logon Reporter Launched
lepide-sql-storage-manager-launched/
1 page
Lepide SQL Storage Manager Launched
ladss-updates-for-version-11-12-01/
1 page
LADSS Updates for Version 11.12.01
lepide-event-log-manager-launched/
1 page
Lepide Event log Manager Launched
lepide-active-directory-self-service-tool-launched/
1 page
Lepide Active Directory Self Service Tool Launched
launched-lepide-free-tools/
1 page
Launched: Lepide Free Tools
careers/
16 pages
Lepide Careers
Lepide Careers | Frontend Engineer
Lepide Careers | Backend Engineer
Lepide Careers | SaaS/Cloud Architect
Lepide Careers | QA-Lead
Lepide Careers | PHP Developer
Lepide Careers | PHP Developer
Job Opening for Dot Net Developer
Lepide Careers | PHP Developer
Job Opening for Sales Development Representative Team Leader
Job Opening for Product Developer
Job Opening for Account Manager - London
Job Opening for Account Manager - Austin
Job Opening for Marketing Campaign Manager
Lepide Careers | Implementation Engineer
Job Application for
partnersportal/
2 pages
Log in » Lepide Partner Portal
Lost password » Lepide Partner Portal
tutorials/
18 pages
Tutorials and Training for Lepide Data Security Platform
Tutorial - Getting Started with Lepide Data Security Platform
Tutorial - Configuring Lepide DSP for AD/GP/Exchange Auditing
Tutorial - Configure Lepide DSP for File Server Auditing
How To Use Lepide To Audit Office 365
How To Track How Users Are Interacting With Sensitive Data
How To Use Lepide To Implement Least Privilege
How To Reduce False Positives In Data Classification With Lepide
How To Automate Threat Response Using Lepide Data Security Platform
How To Use Threshold Alerting To Detect Threats
How to Use Lepide To Help Locate and Classify Sensitive Data
How to Use Lepide to Track the Source of Account Lockouts
How to Use Lepide To Track Logon And Logoff Activity
How Can I Use Lepide To Help With Password Resets And Active Directory Self-Service
Using Lepide To Detect And Respond To Users With Passwords That Never Expire
How to Use Lepide to Track Inactive User Accounts
How Can I Use Lepide to Keep Track of File and Folder Activity
What Changes Can Lepide Track in Active Directory
whitepaper/
40 pages
Lepide Whitepapers: Cyber-Security, Ransomware and IT Auditing
The Complete Guide to CJIS Compliance for Government Bodies
The Complete Guide to Effective Data Access Governance
The Complete Guide to Zero Trust for Government Bodies
The Complete Guide to Zero Trust for Education
Active Directory and Windows Infrastructure as a Malware Tool - Whitepaper
10 Best Practices for Keeping Active Directory Secure
Avoiding privilege abuse in Active Directory
Basic Principles for Securing Active Directory – Whitepaper
taking-active-directory-auditing-to-the-next-level.pdf
9 Critical Flaws in Auditing Active Directory Natively
Why the CISO Needs to Take a Data-Centric View on Security - Lepide Whitepaper
Whitepaper - How to Build a Business Case for Information Security
Why Visibility is the C-Suite’s Greatest Security Risk – Whitepaper
How CISOs Can Win Over the Board on Cybersecurity Strategy
The New US Data Privacy Environment | Lepide Whitepaper
Four Steps to Complying with the GLBA Safeguards Rule| Lepide Whitepaper
Four Secrets of US HIPAA Compliance | Lepide Whitepaper
The New GLBA Safeguards Rule and the Future of US Financial Industry Data Security - Whitepaper
How Auditing Helps Meet PCI DSS Compliance - Whitepaper
Executive’s Guide to the Business of Malware - Whitepaper
Popular Cyber Attack Methods and How to Mitigate Them
10 Things IT Departments Do to Prevent Cyber Attacks and Meet Compliance
Is Your Organization Prepared for a Cyber-Attack?
Detecting Ransomware using File Server Auditing – Whitepaper
Generative AI Security Risks and How to Overcome Them
Lepide Guide for Microsoft 365 Copilot
How to Secure and Protect Personally Identifiable Information (PII)
Do You Need A Data-Centric Audit & Protection Solution?
Executive's Guide to Essential Penetration Testing Techniques - Whitepaper
Security Monitoring: The Missing Link – Whitepaper
Insider Threats: Trust Isn’t a Security Strategy
SIEM-less Auditing - A Seamless Auditing Solution in Microsoft Windows – Whitepaper
Auditing, Logging and Alerting - Lepide Whitepaper
Identifying and Protecting PHI Within Legacy Healthcare Systems
A Guide to Cybersecurity in the Legal Sector – Whitepaper
Should the NHS Outsource Information Governance – Whitepaper
The-Current-US-Data-Privacy-Environment.pdf
a-four-step-roadmap-to-complying-with-the-safeguards-rule.pdf
the-four-secrets-of-us-hipaa-compliance.pdf
ebook/
4 pages
Lepide eBooks for Identity Security, Data Security, and Compliance
The Complete Guide to the NIST Cybersecurity Framework
The Complete Guide to Data Protection | eBook
The Complete Guide to Ransomware | Ransomware eBook
blog/
1 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations
common-sharepoint-security-mistakes/
1 page
Common SharePoint Security Mistakes and How to Avoid Them
category/
data-security/
1 page
Data Security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
ciso/
1 page
CISO Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
auditing/
1 page
Auditing Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
compliance/
1 page
Compliance Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
ransomware/
1 page
Ransomware Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
it-operations/
1 page
IT Operations Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
general/
1 page
General Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
office-365/
1 page
Office 365 Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
what-is-data-governance/
1 page
What is Data Governance? Importance and Benefits
author/
anna/
1 page
Anna Szentgyorgyi-Siklosi, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
terry-mann/
1 page
Terry Mann, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
aidan/
1 page
Aidan Simister, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
dan-goater/
1 page
Dan Goater, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
danny/
1 page
Danny Murphy, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
sarahm/
1 page
Sarah Marshall, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
phillip-robinson/
1 page
Philip Robinson, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
craig/
1 page
Craig Smilowitz, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
sharon-marusich/
1 page
Sharon Marusich, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
natasha-murphy/
1 page
Natasha Murphy, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
iain-roberts/
1 page
Iain Roberts, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
jason/
1 page
Jason Coggins, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
brian-jefferson/
1 page
Brian Jefferson, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
josh-van-cott/
1 page
Josh Van Cott, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
what-is-hybrid-cloud-storage/
1 page
Hybrid Cloud Storage : A Smart Solution to Enterprise Data Demands
the-growing-threat-of-ransomware-in-2024/
1 page
The Growing Threat of Ransomware – Major Lessons learned in 2024
10-best-practices-to-secure-windows-server/
1 page
10 Best Practices to Secure Windows Server
data-governance-roles-and-responsibilities/
1 page
Data Governance Roles and Responsibilities: The Blueprint for Data Integrity
how-to-build-a-data-governance-framework/
1 page
How to Build a Data Governance Framework
sharepoint-permissions-a-complete-guide/
1 page
SharePoint Permissions: A Complete Guide
what-is-the-principle-of-least-privilege-polp/
1 page
Principle of Least Privilege (PoLP): Benefits and How to Implement
tag/
data-security/
1 page
Data Security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
sharepoint/
1 page
SharePoint Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
cyber-security/
1 page
Cyber Security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
ransomware/
1 page
Ransomware Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
windows-server/
1 page
Windows Server Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
data-governance/
1 page
Data Governance Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
data-protection/
1 page
Data Protection Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
microsoft-365/
1 page
Microsoft 365 Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
polp/
1 page
PoLP Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
principle-of-least-privilege/
1 page
Principle of Least Privilege Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
group-policy/
1 page
Group Policy Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
group-policy-examples/
1 page
Group Policy Examples Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
cyber-attack/
1 page
cyber attack Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
account-locked-out/
1 page
Account-Locked-Out Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
active-directory/
1 page
Active Directory Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
active-directory-security/
1 page
Active Directory security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
zero-trust/
1 page
Zero Trust Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
cloud-security/
1 page
Cloud Security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
dropbox/
1 page
Dropbox Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
data-privacy/
1 page
Data Privacy Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
honey-tokens/
1 page
Honey Tokens Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
sensitive-data/
1 page
sensitive data Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
threat-detection/
1 page
Threat Detection Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
nutanix-security/
1 page
Nutanix Security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
dell-emc/
1 page
Dell EMC Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
salesforce/
1 page
Salesforce Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
unstructured-data/
1 page
Unstructured Data Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
data-breach/
1 page
Data Breach Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
access-control/
1 page
Access Control Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
rbac/
1 page
RBAC Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
access-management/
1 page
Access Management Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
pam/
1 page
PAM Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
privileged-access-management-pam/
1 page
Privileged Access Management (PAM) Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
edr/
1 page
EDR Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
endpoint-detection-and-response/
1 page
Endpoint Detection and Response Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
awareness-training/
1 page
Awareness Training Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
training/
1 page
Training Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
data-governance-policy/
1 page
Data Governance Policy Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
data-risk-assessment/
1 page
Data Risk Assessment Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
dra/
1 page
DRA Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
compliance/
1 page
Compliance Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
compliance-management/
1 page
Compliance Management Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
amazon-s3/
1 page
Amazon S3 Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
nasuni/
1 page
Nasuni Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
data-classification/
1 page
Data Classification Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
data-encryption/
1 page
Data Encryption Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
access-control-models/
1 page
Access Control Models Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
data-masking/
1 page
Data Masking Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
phishing/
1 page
Phishing Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
dag/
1 page
DAG Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
data-access-governance/
1 page
Data Access Governance Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
ddos-attack/
1 page
DDoS Attack Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
security-automation/
1 page
Security Automation Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
ai-in-healthcare/
1 page
AI in Healthcare Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
cybersecurity/
1 page
cybersecurity Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
iam/
1 page
IAM Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
identity-and-access-management/
1 page
Identity and Access Management Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
phishing-attacks/
1 page
Phishing Attacks Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
incident-response/
1 page
Incident Response Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
event-id/
1 page
Event ID Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
windows/
1 page
Windows Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
employees/
1 page
Employees Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
aws-breach-alert/
1 page
AWS Breach Alert Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
adt-data-breach/
1 page
ADT Data Breach Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
access-controls/
1 page
Access Controls Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
copilot/
1 page
Copilot Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
office-365/
1 page
Office 365 Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
microsoft-copilot/
1 page
Microsoft Copilot Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
network-devices/
1 page
Network Devices Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
network-security/
1 page
Network Security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
centralization-vs-decentralization/
1 page
Centralization vs Decentralization Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
personal-data/
1 page
Personal Data Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
data-detection-and-response/
1 page
Data Detection and Response Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
ddr/
1 page
DDR Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
prompt-injection-attacks/
1 page
Prompt Injection Attacks Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
security-service-edge/
1 page
Security Service Edge Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
sse/
1 page
SSE Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
ai/
1 page
AI Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
trism/
1 page
TRiSM Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
cyber-kill-chain-vs-mitre-attck/
1 page
Cyber Kill Chain vs MITRE ATT&CK Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
active-directory-domain-services/
1 page
Active Directory Domain Services Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
ad-ds/
1 page
AD DS Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
ai-security/
1 page
AI Security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
generative-ai-security/
1 page
Generative AI Security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
password-attacks/
1 page
Password Attacks Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
network-attacks/
1 page
Network Attacks Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
gpuupdate/
1 page
GPUupdate Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
insider-threat/
1 page
Insider Threat Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
powershell/
1 page
PowerShell Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
organizational-unit/
1 page
Organizational Unit Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
osint/
1 page
OSINT Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
employees-training/
1 page
Employees Training Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
azure-active-directory/
1 page
Azure Active Directory Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
insider-risk/
1 page
Insider Risk Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
aws/
1 page
AWS Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
dlp/
1 page
DLP Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
authentication/
1 page
Authentication Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
authorization/
1 page
Authorization Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
user-access/
1 page
User Access Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
permission/
1 page
permission Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
privilege-escalation/
1 page
Privilege Escalation Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
window/
1 page
window Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
password-management/
1 page
Password Management Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
active-directory-groups/
1 page
Active Directory Groups Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
ransomware-protection/
1 page
Ransomware Protection Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
database/
1 page
Database Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
data-centric-security/
1 page
Data-Centric Security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
pci/
1 page
PCI Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
glba/
1 page
GLBA Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
hipaa-compliance/
1 page
HIPAA Compliance Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
cmmc/
1 page
CMMC Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
iso-27001/
1 page
ISO 27001 Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
sox/
1 page
SOX Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
ferpa/
1 page
FERPA Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
ny-shield-act/
1 page
NY SHIELD Act Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
ccpa/
1 page
CCPA Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
gdpr/
1 page
GDPR Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
dsar/
1 page
DSAR Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
hipaa/
1 page
HIPAA Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
auditing/
1 page
Auditing Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
ciso/
1 page
CISO Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
microsoft-exchange/
1 page
Microsoft Exchange Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
sharepoint-security/
1 page
SharePoint Security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
ntfs/
1 page
NTFS Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
share-permissions/
1 page
Share Permissions Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
exchange-online/
1 page
Exchange Online Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
password-security/
1 page
Password Security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
it-security/
1 page
it security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
permissions/
1 page
Permissions Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
data-leak/
1 page
Data Leak Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
azure-ad/
1 page
Azure AD Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
entra-id/
1 page
Entra ID Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
insider-threats/
1 page
Insider Threats Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
gpo/
1 page
GPO Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
windows-file-server/
1 page
Windows File Server Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
malware/
1 page
malware Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
google-workspace/
1 page
Google Workspace Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
microsoft-teams/
1 page
Microsoft Teams Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
ms-teams/
1 page
MS Teams Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
onedrive/
1 page
OneDrive Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
sql-server/
1 page
SQL Server Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
microsoft-365-security/
1 page
Microsoft 365 Security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
office-365-security/
1 page
Office 365 Security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
file-server/
1 page
file server Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
ntfs-permissions/
1 page
NTFS Permissions Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
privilege-management/
1 page
Privilege Management Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
risk-assessment/
1 page
Risk Assessment Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
data-loss-prevention/
1 page
Data Loss Prevention Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
machine-learning/
1 page
Machine Learning Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
threat-intelligence/
1 page
Threat Intelligence Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
nis2/
1 page
NIS2 Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
database-security/
1 page
Database security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
cjis/
1 page
CJIS Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
top-10-most-important-group-policy-settings-for-preventing-security-breaches/
1 page
Group Policy Examples and Settings for Effective Administration
the-15-most-common-types-of-cyber-attacks/
1 page
15 Most Common Types of Cyber Attack and How to Prevent Them
what-are-the-common-root-causes-of-account-lockouts-and-do-i-resolve-them/
1 page
Why the AD Account Keeps Getting Locked Out Frequently and How to Resolve It
how-to-implement-zero-trust-architecture-in-active-directory/
1 page
How to Implement Zero Trust Architecture in Active Directory
dropbox-security-best-practices/
1 page
Dropbox Security Best Practices: Strategies for Maximizing Your Security
common-data-governance-mistakes/
1 page
Common Data Governance Mistakes and How to Fix Them
honey-tokens-explained-the-key-to-effective-threat-detection/
1 page
Honey Tokens Explained: The Key to Effective Threat Detection
nutanix-security-best-practices/
1 page
Nutanix Security Best Practices
best-practices-for-securing-dell-emc-storage-solutions/
1 page
Best Practices for Securing Dell EMC Storage Solutions
a-complete-guide-to-securing-unstructured-data-in-salesforce/
1 page
A Complete Guide to Securing Unstructured Data in Salesforce
active-directory-security-best-practices/
1 page
What is Active Directory Security? Best Practices & Checklist
what-is-a-data-breach/
1 page
What is a Data Breach and How to Protect Against It?
what-is-role-based-access-control/
1 page
Role-Based Access Control (RBAC) Guide & How to Implement It?
what-is-privileged-access-management/
1 page
What is Privileged Access Management (PAM) & Its Importance
what-is-endpoint-detection-and-response/
1 page
What is Endpoint Detection and Response (EDR) and Its Role in Cybersecurity?
how-to-give-cyber-security-awareness-training-to-employees/
1 page
How to Give Cyber Security Awareness Training to Employees
zero-trust-security-challenges/
1 page
Zero-Trust Security Challenges
how-to-create-an-effective-data-protection-strategy/
1 page
How to Create an Effective Data Protection Strategy
what-is-data-governance-policy/
1 page
What is Data Governance Policy? Examples, Templates & Benefits
what-is-data-risk-assessment-dra-and-how-to-perform-it/
1 page
What is Data Risk Assessment (DRA) and How to Perform It?
what-is-compliance-management/
1 page
What Is Compliance Management and Why It Matters
amazon-s3-security-best-practices-a-comprehensive-guide/
1 page
Amazon S3 Security Best Practices: A Comprehensive Guide
nasuni-security-best-practices/
1 page
Nasuni Security Best Practices
what-is-sensitive-data/
1 page
What is Sensitive Data? Examples, and Types
what-is-data-security/
1 page
What is Data Security? Importance, Types, and Threats
what-is-data-classification-and-how-to-do-it/
1 page
What is Data Classification? Common Types, Levels & Examples
5-benefits-of-using-encryption-technology-for-data-protection/
1 page
What is Data Encryption? Benefits of Using Encryption Technology
types-of-access-control-models/
1 page
Types of Access Control Models and Methods – A Complete Guide
what-is-data-masking/
1 page
What is Data Masking? Types, Techniques and Best Practices
what-are-phishing-attacks-and-how-do-they-happen/
1 page
What Are Phishing Attacks and How do They Happen?
what-is-data-access-governance/
1 page
What is Data Access Governance and How to Implement It
top-data-privacy-best-practices-for-a-secure-organization/
1 page
Top 10 Data Privacy Best Practices for a Secure Organization
tips-to-securely-manage-user-accounts-in-higher-education/
1 page
Tips to Securely Manage User Accounts in Higher Education
the-internet-archive-cyberattack-31-million-accounts-exposed/
1 page
The Internet Archive Cyberattack: 31 Million Accounts Exposed
what-is-security-automation-common-types-best-practices/
1 page
What is Security Automation? Common Types & Best Practices
how-to-protect-active-directory-from-ransomware-attacks/
1 page
How to Protect Active Directory from Ransomware Attacks
ai-in-healthcare-security-and-privacy-concerns/
1 page
AI in Healthcare: Security and Privacy Concerns
the-role-of-active-directory-in-cybersecurity/
1 page
The Role of Active Directory in Cybersecurity
top-10-security-measures-every-organization-should-have/
1 page
Top 10 Data Security Measures Every Organization Should Have
what-is-identity-and-access-management/
1 page
What is Identity and Access Management (IAM)? How it Works & Benefits
what-is-active-directory-and-how-does-it-work/
1 page
What is Active Directory? Structure, How It Works & Benefits
10-ways-to-prevent-phishing-attacks/
1 page
How to Prevent Phishing Attacks: 10 Ways to Avoid Phishing
what-is-incident-response/
1 page
What is Incident Response? A Comprehensive Guide
what-is-event-id-4770/
1 page
Event ID 4770 – A Kerberos Service Ticket was Renewed
data-access-governance-vs-data-classification-key-differences/
1 page
Data Access Governance vs Data Classification: Key Differences
stop-blaming-employees-for-cybersecurity-failings/
1 page
Stop Blaming Employees for Cybersecurity Failings
aws-breach-alert-110000-domains-compromised/
1 page
AWS Breach Alert: 110,000 Domains Compromised by Exposed .env Files
adt-data-breach-a-wake-up-call-for-cybersecurity/
1 page
ADT Data Breach: A Wake-Up Call for Cybersecurity
the-importance-of-access-controls-in-incident-response/
1 page
The Importance of Access Controls in Incident Response
how-does-microsoft-365-copilot-pricing-and-licensing-work/
1 page
How does Microsoft 365 Copilot Pricing and Licensing Work
how-to-install-and-set-up-copilot-for-microsoft-365/
1 page
How to Install and Set Up Copilot for Microsoft 365
what-is-microsoft-copilot/
1 page
What is Microsoft Copilot? Types, Benefits and How to Use It
windows-event-id-4624/
1 page
Windows Event ID 4624 for Successful Logons
data-governance-best-practices/
1 page
6 Essential Data Governance Best Practices
microsoft-365-ransomware-protection-guide/
1 page
Microsoft 365 Ransomware Protection Guide
group-policy-management-best-practices/
1 page
Group Policy Management Best Practices
top-10-network-security-best-practices/
1 page
Top 10 Network Security Best Practices
decentralized-vs-centralized-data-governance/
1 page
Centralization vs Decentralization Data Governance: The Key Differences
10-best-ways-to-protect-your-personal-data/
1 page
10 Best Ways to Protect Your Personal Data
what-is-data-detection-and-response-ddr/
1 page
What is Data Detection and Response (DDR)?
what-is-prompt-injection-attacks-and-how-to-prevent-them/
1 page
What is Prompt Injection Attacks and How to Prevent them?
what-is-security-service-edge-sse/
1 page
What is Security Service Edge (SSE)? Benefits & How It Works
what-is-group-policy-gpo-and-what-role-does-it-play-in-data-security/
1 page
What are Group Policy and GPO and What Role do they Play in Data Security?
easy-guide-to-group-policy-object-precedence/
1 page
Easy Guide to Group Policy Object Precedence
cloud-security-challenges-and-best-practices/
1 page
Cloud Security Challenges And Best Practices
what-is-ai-trism/
1 page
What is AI TRiSM? (AI Trust, Risk, and Security Management)
cyber-kill-chain-vs-mitre-attck-what-are-the-key-differences/
1 page
Cyber Kill Chain vs MITRE ATT&CK: Which One is Better
what-is-active-directory-domain-services/
1 page
What is Active Directory Domain Services?
generative-ai-security-risks-and-how-to-overcome-them/
1 page
Generative AI Security Risks and How to Overcome Them
types-of-password-attacks/
1 page
Types of Password Attacks and How to Prevent Them
common-types-of-network-attacks/
1 page
Top 10 Most Common Types of Network Attacks
australian-privacy-act-overview/
1 page
Australian Privacy Act Overview
what-is-dora-compliance/
1 page
What is DORA Compliance? Purpose, Requirements and Checklist
windows-event-id-4774/
1 page
Windows Event ID 4774 – An Account was Mapped for Logon
what-is-the-gpuupdate-command-in-active-directory/
1 page
What is the GPUupdate Command in Active Directory
nist-csf-1-1-vs-2-0/
1 page
NIST CSF 1.1 vs 2.0 and Key Elements of NIST CSF 2.0
malicious-insider-threats-examples-and-techniques/
1 page
Malicious Insider Threats: Examples and Techniques
get-childitem-powershell-cmdlet-guide/
1 page
Get-ChildItem PowerShell – A Complete Guide
windows-event-id-4773-a-kerberos-service-ticket-request-failed/
1 page
Event ID 4773 – A Kerberos Service Ticket Request Failed
what-is-an-ou-in-active-directory/
1 page
What is an Organizational Unit (OU) in Active Directory?
what-is-open-source-intelligence-osint/
1 page
What is OSINT (Open Source Intelligence)?
windows-event-id-4769/
1 page
Event ID 4769 – A Kerberos Service Ticket was Requested
training-employees-to-identify-insider-threats/
1 page
Training Employees to Identify Insider Threats
what-is-azure-active-directory/
1 page
What is Azure Active Directory? Azure AD vs Windows AD
windows-event-id-4768-for-kerberos-authentication/
1 page
Windows Event ID 4768 for Kerberos Authentication
windows-powershell-scripting-beginner-guide/
1 page
Windows PowerShell Scripting Beginner Tutorial
data-breach-common-reasons-and-prevention-tips/
1 page
Data Breach Guide: Common Reasons and Prevention Tips
what-is-ghidra-and-how-to-use-it/
1 page
What is Ghidra and How to Use it to Reverse Engineer Malware
build-effective-insider-risk-management/
1 page
How to Build an Effective Insider Risk Management Program
remote-work-security-risks-and-best-practices/
1 page
What is Remote Work Security? Risks and Best Practices
active-directory-and-iam/
1 page
Active Directory and IAM
aws-dlp-best-practices/
1 page
AWS DLP (Data Loss Prevention) Best Practices
what-is-a-risk-management-strategy/
1 page
What Is a Risk Management Strategy?
how-to-view-and-export-windows-event-logs/
1 page
How to View and Export Windows Event Logs
common-active-directory-naming-limitations/
1 page
Common Active Directory Naming Limitations
difference-between-authentication-and-authorization/
1 page
Authentication vs Authorization: Difference Between Authentication and Authorization
what-is-active-directory-federation-services/
1 page
What is Active Directory Federation Services (ADFS) and How Does It Work?
what-is-privilege-escalation-and-how-to-detect-it/
1 page
What Is Privilege Escalation and How Can It Be Detected?
what-is-microsoft-365-copilot-and-how-do-you-deploy-it/
1 page
What is Microsoft 365 Copilot and How Do You Deploy It Securely?
top-7-microsoft-365-cyber-security-challenges-it-admins-face/
1 page
Top 7 Microsoft 365 Cyber Security Challenges IT Admins Face
what-are-identity-based-attacks/
1 page
What are Identity-Based Attacks and How to Stop Them?
what-is-group-policy-editor-how-do-you-access-and-use-it/
1 page
What is Group Policy Editor? How do You Access and Use It?
best-practices-for-password-management-and-security/
1 page
Best Practices for Password Management and Security
what-are-active-directory-groups/
1 page
What are Active Directory Groups? Definition, Types & Scope
what-is-data-retention-policy-and-how-to-create-one/
1 page
What is Data Retention Policy and How to Create One?
what-is-oauth-and-how-does-it-work/
1 page
What is OAuth and How Does It Work?
how-to-setup-and-manage-group-managed-service-accounts-gmsas/
1 page
How to Setup and Manage Group Managed Service Accounts (gMSAs)
how-to-protect-backups-from-ransomware-attacks/
1 page
How To Protect Backups from Ransomware Attacks
what-is-data-security-management/
1 page
What Is Data Security Management?
how-to-secure-open-ports-from-vulnerabilities/
1 page
Open Port Vulnerabilities: How to Secure Open Ports
what-is-rot-data-and-how-to-manage-it/
1 page
What is ROT (Redundant, Obsolete, and Trivial) Data and How to Manage It
understanding-active-directory-ous-vs-groups/
1 page
The Difference Between Active Directory OUs and Groups
what-is-file-security-importance-best-practices/
1 page
What is File Security? Importance & Best Practices
how-to-setup-and-manage-group-managed-service-accounts/
1 page
How to Setup and Manage Group Managed Service Accounts
20-questions-about-data-privacy-you-need-to-ask/
1 page
20 Questions About Data Privacy You Need to Ask
what-is-double-extortion-ransomware/
1 page
What is Double Extortion Ransomware?
what-is-a-user-access-review-best-practices-and-checklist/
1 page
What is a User Access Review? Best Practices & Checklist
what-is-microsoft-laps/
1 page
What is Microsoft LAPS: Security, Installation, and FAQs
common-cloud-misconfigurations-that-lead-to-data-loss/
1 page
Common Cloud Misconfigurations That Lead to Data Loss
using-biometric-authentication-with-active-directory/
1 page
Using Biometric Authentication with Active Directory
what-is-a-security-policy/
1 page
What is a Security Policy? Types, Components and Examples
top-industries-most-vulnerable-to-cyber-attacks/
1 page
Top Industries Most Vulnerable to Cyber Attacks
types-of-data-security-controls-and-best-practices-to-implement-them/
1 page
Types Of Data Security Controls & Best Practices to Implement Them
what-is-an-active-directory-domain/
1 page
What is an Active Directory Domain?
what-is-privileged-attribute-certificate-pac/
1 page
What is Privileged Attribute Certificate (PAC)?
gdpr-data-controller-vs-data-processor/
1 page
GDPR Data Controller vs Data Processor
authenticated-users-vs-everyone-group-in-active-directory/
1 page
Authenticated Users vs Everyone Group in Active Directory
reasons-why-identity-and-access-management-is-important/
1 page
Reasons Why Identity and Access Management is Important
ccsp-vs-sscp-vs-cissp-vs-csslp-vs-cap-vs-hcispp/
1 page
CCSP vs SSCP vs CISSP vs CSSLP vs CAP vs HCISPP
nist-800-53-a-complete-guide-for-compliance/
1 page
NIST 800 53: A Complete Guide for Compliance
what-is-a-silver-ticket-attack-and-how-to-prevent-it/
1 page
What is a Silver Ticket Attack and How to Prevent It?
configure-and-maintain-group-policy-objects/
1 page
How to Configure and Maintain Group Policy Objects (GPOs)
azure-compliance-a-complete-guide/
1 page
Azure Compliance: A Complete Guide
what-is-perimeter-security-benefits-and-key-elements/
1 page
What is Perimeter Security? Benefits and Key Elements
what-is-kerberos-delegation/
1 page
What Is Kerberos Delegation? Securing Constrained Delegation
what-is-ntlm-authentication/
1 page
What is NTLM Authentication?
enhancing-cyber-defense-in-manufacturing-industry/
1 page
Enhancing Cyber Defense in Manufacturing: The NIST Cybersecurity Framework as a Solution
how-to-mitigate-zerologon-attacks-in-active-directory/
1 page
How to Mitigate Zerologon Attacks in Active Directory
leveraging-the-nist-framework-in-educational-institutions/
1 page
Leveraging the NIST Framework in Educational Institutions
active-directory-password-policy-guide/
1 page
Active Directory Password Policy Management & Best Practices
implementing-the-nist-framework-in-healthcare-organizations/
1 page
A Guide to Implementing the NIST Framework in Healthcare Organizations
nist-framework-for-cybersecurity-challenges-in-financial-institutions/
1 page
Cybersecurity Challenges in Financial Institutions: How the NIST Framework Can Help
securing-active-directory-federation-services/
1 page
Securing Active Directory Federation Services (ADFS)
rorschach-ransomware/
1 page
Rorschach Ransomware: The Fastest Strain to Date
securing-active-directory-certificate-services/
1 page
Securing Active Directory Certificate Services (AD CS): Configuration and Management Tips
windows-audit-policy-best-practices/
1 page
Windows Audit Policy Best Practices and Guidelines
cloud-security-best-practices/
1 page
Cloud Security: Major Threats and Best Practices
the-moveit-attack-explained/
1 page
The MOVEit Attack Explained
ransomware-mitigation-strategies-for-industrial-control-systems/
1 page
Ransomware Mitigation Strategies for Industrial Control Systems (ICS)
privileged-access-management-best-practices/
1 page
Privileged Access Management Best Practices
what-is-threat-modeling-process-framework-methodologies/
1 page
What Is Threat Modeling? Process, Framework & Methodologies
data-classification-types/
1 page
What are the Common Data Classification Types
active-directory-authentication-protocols/
1 page
Active Directory Authentication Protocols: Understanding Security Risks and Solutions
top-ransomware-attack-vectors/
1 page
Top 5 Ransomware Attack Vectors and How to Mitigate Them
what-is-litigation-hold-in-office-365/
1 page
What is Litigation Hold in Office 365 and How Do You Set it Up?
best-practices-to-prevent-insider-threats/
1 page
Best Practices to Prevent Insider Threats
what-is-cactus-ransomware/
1 page
What is CACTUS Ransomware, and How does It Work?
the-role-of-ai-in-data-access-governance/
1 page
The Role of AI in Data Access Governance
common-ransomware-encryption-techniques/
1 page
Common Ransomware Encryption Techniques
top-techniques-for-insider-threat-detection/
1 page
Insider Threat Detection: Top Techniques to Detect Insider Threats
active-directory-trust-relationships-security-considerations-and-risk-mitigation/
1 page
Active Directory Trust Relationships: Security Considerations and Risk Mitigation
what-is-cloud-data-loss-prevention/
1 page
What is Cloud DLP? Benefits of Using Cloud DLP
10-most-commonly-used-office-365-powershell-commands/
1 page
10 Most Commonly Used Office 365 PowerShell Commands
ransomware-and-deepfake-technology/
1 page
Ransomware and Deepfake Technology: The Convergence of Cyber Threats
what-is-data-protection/
1 page
What is Data Protection? Policies & Strategies to Protect Data
what-are-8-data-subject-rights-under-gdpr/
1 page
What are 8 Data Subject Rights Under GDPR
how-to-make-security-more-user-friendly/
1 page
How to Make Security More User-Friendly
common-mistakes-made-by-privileged-users/
1 page
Common Mistakes Made by Privileged Users
data-security-best-practices/
1 page
Top 10 Data Security Best Practices to Safeguard Your Data
what-is-the-data-protection-and-digital-information-bill-dpdi/
1 page
What is the Data Protection and Digital Information Bill (DPDI)?
what-is-revil-sodinokibi-ransomware/
1 page
What is REvil/Sodinokibi Ransomware
active-directory-disaster-recovery-best-practices/
1 page
Active Directory Disaster Recovery Steps and Best Practices
active-directory-account-lockout-policy-best-practices/
1 page
Account Lockout Policy Best Practices for Active Directory
what-is-phobos-ransomware/
1 page
Phobos Ransomware: All You Need to Know
petya-and-notpetya-ransomware/
1 page
What are Petya and NotPetya Ransomware Attacks? Everything You need to Know
saas-compliance-checklist/
1 page
SaaS Compliance Checklist: A Complete Guide
lockbit-ransomware-everything-you-need-to-know/
1 page
What is LockBit Ransomware? Types & How Does LockBit Spread
fisma-compliance-checklist/
1 page
FISMA Compliance Checklist
what-is-babuk-ransomware/
1 page
What is Babuk Ransomware?
user-access-review-best-practices/
1 page
User Access Review Best Practices
how-does-ransomware-spread/
1 page
How Does Ransomware Spread? 10 Common Methods
what-is-data-access-control/
1 page
What is Data Access Control?
free-active-directory-management-and-reporting-tools/
1 page
Free Tools for Active Directory Management and Reporting
how-to-prevent-amazon-s3-data-leaks/
1 page
How to Prevent Amazon S3 Data Leaks
what-is-tisax-certification-everything-you-need-to-know/
1 page
What is TISAX Certification? Everything You Need to Know
the-role-of-machine-learning-in-data-security/
1 page
The Role of Machine Learning in Data Security
the-difference-between-data-privacy-and-data-security/
1 page
Data Privacy vs Data Security: The Key Differences
siem-vs-log-management-system/
1 page
SIEM vs Log Management System – Key Differences
what-is-cyber-insurance/
1 page
What is Cyber Insurance? Who needs It & What does it Cover?
top-7-identity-security-trends-in-2023/
1 page
Top 7 Identity Security Trends In 2023
what-is-a-data-repository/
1 page
What is a Data Repository and Why You Need It?
the-role-of-file-auditing-in-compliance/
1 page
What is File Auditing and How It Helps with Compliance
what-is-attack-path-management/
1 page
What is Attack Path Management?
best-practices-for-identity-security/
1 page
Best Practices for Identity Security
audit-successful-logon-logoff-and-failed-logons-in-activedirectory/
1 page
Audit Failed Logon Events or Attempts in Active Directory
it-compliance-audit-checklist/
1 page
IT Compliance Audit Checklist
how-to-handle-data-subject-access-requests/
1 page
How to Handle Data Subject Access Requests
what-is-itar-compliance/
1 page
What is ITAR Compliance?
what-is-stale-data-and-why-it-is-cyber-security-threat/
1 page
What is Stale Data and Why it is Cyber Security Threat?
what-is-identity-threat-detection-and-response-itdr/
1 page
What is Identity Threat Detection and Response (ITDR)?
what-is-e-discovery/
1 page
What is eDiscovery? Definition and How It Works?
what-is-a-common-internet-file-system-cifs/
1 page
What is a Common Internet File System (CIFS)?
how-to-detect-privileged-account-abuse/
1 page
How to Detect Privileged Account Abuse
what-is-database-security/
1 page
What is Database Security? Common Threats & Best Practices
aws-security-best-practices/
1 page
AWS Security Best Practices
guide-to-the-ftc-safeguards-rule/
1 page
Guide to the FTC Safeguards Rule
top-10-active-directory-attack-methods/
1 page
Top 10 Active Directory Attack Methods
what-is-a-ddos-attack/
1 page
What is a DDoS Attack? The Complete Guide
what-is-a-third-party-data-breach/
1 page
What Is a Third Party Data Breach And Do You Prevent One?
how-hackers-can-bypass-multi-factor-authentication/
1 page
How Hackers Can Bypass Multi-Factor Authentication
what-is-purpose-based-access-control-pbac/
1 page
What Is Purpose-Based Access Control (PBAC)?
what-is-a-blast-radius-in-data-security-terms/
1 page
What is a Blast Radius in Data Security Terms?
what-are-indicators-of-compromise/
1 page
What are Indicators of Compromise?
what-is-social-engineering/
1 page
What is Social Engineering?
top-cyber-threats-to-financial-services/
1 page
Top Cyber Threats to Financial Services
what-is-just-in-time-access/
1 page
What is Just-In-Time Access?
how-to-check-microsoft-office-365-audit-logs/
1 page
How to Check Microsoft Office 365 Audit Logs
cmmc-compliance-challenges/
1 page
CMMC Compliance Challenges
canadas-new-data-privacy-law-cppa-compliance/
1 page
Canada’s New Data Privacy Law: CPPA Compliance
what-is-data-subject-access-request/
1 page
What is Data Subject Access Request?
onedrive-security-best-practices/
1 page
OneDrive Security Best Practices
sql-server-security-best-practices/
1 page
SQL Server Security Best Practices
what-is-an-intrusion-detection-system/
1 page
What is an Intrusion Detection System?
what-is-digital-transformation/
1 page
What Is Digital Transformation?
what-is-onedrive-for-business-and-what-are-the-benefits/
1 page
What is OneDrive for Business and What Are the Benefits?
what-is-an-it-security-audit/
1 page
What is an IT Security Audit?
what-is-data-lifecycle-management/
1 page
What is Data Lifecycle Management?
what-is-multi-factor-authentication-in-office-365/
1 page
What is Multi-Factor Authentication in Office 365?
how-to-classify-data-in-office-365/
1 page
How to Perform Data Classification in Microsoft 365
what-is-anomaly-detection/
1 page
What Is Anomaly Detection?
what-is-identity-security/
1 page
What is Identity Security?
what-is-an-intrusion-prevention-system/
1 page
What is an Intrusion Prevention System?
what-is-chimera-ransomware/
1 page
What is Chimera Ransomware?
important-elements-of-a-data-security-policy/
1 page
Important Elements of a Data Security Policy
what-is-cerber-ransomware/
1 page
What is Cerber Ransomware?
10-powershell-commands-to-better-manage-active-directory/
1 page
10 PowerShell Commands to Better Manage Active Directory
what-is-behavior-based-threat-detection/
1 page
What is Behavior-Based Threat Detection?
nist-password-guidelines/
1 page
NIST Password Guidelines
what-is-blackmatter-ransomware/
1 page
What is BlackMatter Ransomware
what-is-mimikatz-and-how-does-it-work/
1 page
What is Mimikatz and How Does it Work?
the-most-common-types-of-network-devices/
1 page
Network Devices: Common Types and Their Functions
what-is-netwalker-ransomware/
1 page
What is Netwalker Ransomware?
what-is-cryptolocker-ransomware/
1 page
What is Cryptolocker Ransomware?
what-is-blackcat-ransomware/
1 page
What is BlackCat Ransomware and How to Protect Against it?
what-is-data-democratization/
1 page
What is Data Democratization?
top-exploited-vulnerabilities-in-2021/
1 page
Top Exploited Vulnerabilities in 2021
top-10-data-security-solutions-to-secure-your-sensitive-data/
1 page
Top 10 Data Security Solutions to Secure your Sensitive Data
what-is-data-centric-security/
1 page
What is Data-Centric Security?
data-governance-challenges/
1 page
Top 10 Data Governance Challenges and How to Overcome Them
what-is-penetration-testing/
1 page
What is Penetration Testing? Types and Phases of Penetration Testing
best-practices-for-using-azure-ad-connect/
1 page
What is Azure AD Connect: How it Works and Best Practices
what-is-azure-ad-conditional-access/
1 page
What is Azure AD Conditional Access?
top-10-cybersecurity-certifications/
1 page
Top 10 Cybersecurity Certifications
what-is-data-stewardship/
1 page
What is Data Stewardship
what-is-a-business-glossary/
1 page
What is a Business Glossary?
what-is-digital-rights-management/
1 page
What is Digital Rights Management
what-is-lateral-flow-movement-and-how-do-you-detect-it/
1 page
What is Lateral Flow Movement and how do you Detect it
why-you-should-enable-lsa-protection/
1 page
Why You Should Enable LSA Protection
sharepoint-vs-onedrive-which-is-better/
1 page
SharePoint vs OneDrive: Which is Better?
what-is-a-security-operations-center-soc/
1 page
What is a Security Operations Center (SOC)?
the-benefits-of-using-azure-ad/
1 page
The 9 Benefits of Using Azure AD
senate-bill-6-everything-you-need-to-know-about-connecticuts-new-privacy-law/
1 page
Senate Bill 6: Everything you need to know about Connecticut’s New Privacy Law
pci-compliance-best-practices/
1 page
PCI Compliance Best Practices
how-to-do-a-hipaa-risk-assessment/
1 page
How to Do a HIPAA Risk Assessment
updates-to-the-glbas-safeguards-rule/
1 page
Updates to the GLBA’s Safeguards Rule
pci-compliance-checklist/
1 page
What is PCI Compliance? The 12 Requirements and Checklist
a-guide-to-the-texas-medical-records-privacy-act/
1 page
A Guide to the Texas Medical Records Privacy Act
what-is-the-california-privacy-rights-act-cpra-2020/
1 page
What is the California Privacy Rights Act (CPRA) 2020?
what-is-the-information-transparency-and-personal-data-control-act/
1 page
What is the Information Transparency and Personal Data Control Act and Why Does it Matter?
what-is-darkside-ransomware/
1 page
What is DarkSide Ransomware?
what-is-locky-ransomware/
1 page
What is Locky Ransomware?
what-is-wannacry-ransomware/
1 page
What is WannaCry Ransomware
how-to-recover-from-a-ransomware-attack/
1 page
How to Recover from a Ransomware Attack: 10 Steps to Recover from Ransomware
what-is-hive-ransomware/
1 page
What is Hive Ransomware?
how-to-become-a-successful-ciso/
1 page
How to Become a Successful CISO
top-security-concerns-for-cisos-in-2022/
1 page
Top Security Concerns for CISOs in 2022
what-is-an-information-security-policy/
1 page
What Is An Information Security Policy?
preparing-to-be-a-cio-how-to-reduce-stress/
1 page
Preparing to be a CIO: How to Reduce Stress
the-cio-security-checklist-questions-to-answer/
1 page
The CIO Security Checklist: Questions to Answer
why-cisos-and-lawyers-need-to-work-together-for-gdpr-implementation/
1 page
Why CISOs and Lawyers Need to Work Together for GDPR Implementation
cisos-how-to-get-the-cybersecurity-budget-you-need-and-how-to-spend-it/
1 page
CISOs: How to Get the Cybersecurity Budget You Need (and How to Spend it)
why-cisos-are-suffering-from-increasing-levels-of-stress/
1 page
Why CISOs are Suffering from Increasing Levels of Stress
internal-audit-vs-external-audit/
1 page
Internal Audit vs External Audit
what-is-audit-failure-in-event-viewer/
1 page
What is Audit Failure in Event Viewer?
how-to-audit-exchange-online-activity/
1 page
How to Audit Exchange Online Activity
why-it-pays-to-monitor-your-employees/
1 page
Why It Pays to Monitor Your Employees
what-to-look-for-when-monitoring-file-activity-on-file-server/
1 page
Common File Activity Monitoring Use Cases
what-is-an-adminsdholder-attack-and-how-to-defend-against-it/
1 page
What is an AdminSDHolder Attack and How to Defend Against it?
why-data-security-may-be-more-important-than-endpoint-security/
1 page
Why Data Security May Be More Important Than Endpoint Security
whats-the-difference-between-active-directory-and-ldap/
1 page
What’s the Difference Between Active Directory and LDAP?
5-questions-you-need-to-answer-to-protect-yourself-from-rogue-admins/
1 page
5 Questions You Need to Answer to Protect Yourself from Rogue Admins
seven-steps-to-better-active-directory-privileged-access-management/
1 page
Active Directory Privileged Access Management in 7 Steps
more-than-forty-of-companies-dont-know-where-their-data-is-stored/
1 page
More than 40% of Companies Don’t Know Where their Data is Stored
six-simple-ways-to-ensure-data-access-governance-for-file-server/
1 page
6 Simple Ways to Ensure Data Access Governance for File Server
overcoming-the-limitations-of-siem-solutions-with-lepide/
1 page
Overcoming the Limitations of SIEM Solutions with Lepide
we-cant-comply-with-the-gdpr-if-we-cant-manage-our-unstructured-data/
1 page
We Can’t Comply with the GDPR if We Can’t Manage Our Unstructured Data
why-humans-are-still-an-important-part-of-the-cybersecurity-strategy/
1 page
Why Humans Are Still an Important Part of the Cybersecurity Strategy
10-best-practices-for-data-breach-prevention/
1 page
How to Prevent Data Breaches: 10 Best Practices for Prevention
the-lepide-checklist-for-gdpr-compliance/
1 page
GDPR Compliance Checklist – 10 Important Steps to Follow
the-devastating-after-effects-of-a-data-breach/
1 page
The Devastating After-Effects of a Data Breach
how-to-tackle-malicious-password-attacks/
1 page
How to tackle malicious password attacks and reduce costs involved in servicing legitimate account lockouts
5-things-you-need-to-audit-in-active-directory-for-gdpr/
1 page
5 Things You Need to Audit in Active Directory for GDPR
is-your-business-prepared-for-the-forthcoming-gdpr/
1 page
Is your business prepared for the forthcoming GDPR?
three-reasons-why-change-control-is-important/
1 page
3 Reasons Why Change Control Is Important
what-is-siem/
1 page
What is SIEM and How Does It Work? A Complete Guide
what-is-ransomware-as-a-service/
1 page
What is Ransomware-as-a-Service?
what-is-dark-data-and-how-to-find-it/
1 page
What is Dark Data and How to Find it
what-is-file-integrity-monitoring/
1 page
What is File Integrity Monitoring (FIM) and Why Is It Important?
what-is-a-risk-management-framework/
1 page
What is a Risk Management Framework?
top-10-security-events-to-monitor-in-microsoft-365/
1 page
Top 10 Security Events to Monitor in Microsoft 365
what-is-business-email-compromise-and-how-do-you-detect-it/
1 page
What is Business Email Compromise and How Do You Detect it
microsoft-365-guest-users-and-external-access/
1 page
Microsoft 365 Guest Users and External Access
addressing-gaps-between-active-directory-and-microsoft-365-security/
1 page
Addressing Gaps Between Active Directory and Microsoft 365 Security
what-is-passwordless-authentication-benefits-and-challenges/
1 page
What is Passwordless Authentication? Benefits and Challenges
file-sharing-security-best-practices/
1 page
File Sharing Security Best Practices
microsoft-office-365-security-best-practices/
1 page
Microsoft Office 365 Security Best Practices
is-zero-trust-the-future-for-data-security/
1 page
Is Zero Trust the Future for Data Security?
what-is-password-spraying-and-how-to-stop-it/
1 page
What is Password Spraying Attack and How to Stop it?
exchange-server-security-best-practices/
1 page
Top 10 Exchange Server Security Best Practices
what-are-office-365-sensitivity-labels/
1 page
What Are Office 365 Sensitivity Labels?
best-practices-for-google-workspace-security/
1 page
Google Workspace Security Best Practices – A Complete Guide
12-steps-to-take-to-recover-from-a-phishing-attack/
1 page
What to Do After a Phishing Attack: A 12-Step Recovery Plan
how-to-secure-data-in-a-hybrid-workplace/
1 page
How to Secure Data in a Hybrid Workplace
data-protection-for-google-workspace/
1 page
Data Protection for Google Workspace
balancing-data-security-and-accessibility/
1 page
Balancing Data Security and Accessibility
what-to-do-when-an-office-365-account-is-compromised/
1 page
What to Do When an Office 365 Account is Compromised
how-to-implement-zero-trust-security-in-the-cloud/
1 page
How to Implement Zero Trust Security in the Cloud
what-is-the-printnightmare-vulnerability/
1 page
What is the PrintNightmare Vulnerability
what-is-lateral-movement-and-privilege-escalation/
1 page
What is Lateral Movement and Privilege Escalation?
data-security-for-schools/
1 page
Data Security for Schools
cloud-security-threats-and-how-to-mitigate-them/
1 page
Top Cloud Security Threats and How to Mitigate Them
how-to-navigate-insider-risk/
1 page
How to Navigate Insider Risk
microsoft-office-365-file-sharing/
1 page
Microsoft Office 365 File Sharing Guide and Best Practices
how-to-monitor-protected-health-information-phi/
1 page
How to Monitor PHI: What You Need to Monitor
administration-duties-for-improved-security-and-change-control/
1 page
3 Ways to Separate Administration Duties for Improved Security and Change Control
failure-to-secure-end-user-devices-leaves-servers-and-data-at-risk/
1 page
Failure to Secure End-User Devices Leaves Servers and Data at Risk
stay-safe-of-security-risks-this-holiday-season/
1 page
Stay safe of security risks this holiday season
why-choose-microsoft-teams/
1 page
Why Choose Microsoft Teams
how-to-choose-the-right-data-security-solution/
1 page
How to Choose the Right Data Security Solution
what-is-data-sprawl-and-how-do-you-manage-it/
1 page
What is Data Sprawl and How do You Manage It?
password-complexity-vs-length/
1 page
Password Complexity vs Length
office-365-groups-vs-teams/
1 page
Office 365 Groups vs Teams
what-are-amazon-s3-buckets/
1 page
What Are Amazon S3 Buckets?
microsoft-office-365-vs-g-suite-which-is-best/
1 page
Microsoft Office 365 vs Google Workspace (formerly G Suite) – Which is Best?
how-to-secure-data-on-iot-devices-in-5-easy-steps/
1 page
How to Secure Data on IoT Devices in 5 Easy Steps
5-ways-to-keep-your-active-directory-clean/
1 page
Active Directory Cleanup: 5 Best Practices to Keep AD Clean
what-are-office-365-groups/
1 page
What Are Office 365 Groups?
5-things-you-must-get-right-to-secure-laas-and-paas/
1 page
5 Things You Must Get Right to Secure IaaS and PaaS
5-fsmo-roles-active-directory/
1 page
What are FSMO Roles in Active Directory & How to Check Them
what-is-upnp-and-is-it-safe/
1 page
What is UPnP and is it Safe?
what-are-active-directory-security-groups/
1 page
What Are Active Directory Security Groups and How to Create Them
information-security-trends-during-a-recession/
1 page
Information Security Trends During a Recession
how-covid-19-is-changing-cybersecurity/
1 page
Remote Workers: How COVID-19 Is Changing Cybersecurity
sharing-the-results-of-your-security-audit-with-your-employees/
1 page
Why You Should Consider Sharing the Results of Your Security Audit with Your Employees
how-to-require-ldap-signing-in-windows-server/
1 page
How to Require LDAP Signing in Windows Server
fine-grained-password-policy-best-practices/
1 page
How to Create Fine-Grained Password Policy & Best Practices
the-top-10-data-breaches-of-2018/
1 page
The Top 10 Data Breaches of 2018
the-difference-between-information-security-and-cybersecurity/
1 page
The Difference Between Information Security and Cybersecurity
how-data-access-governance-compliments-privileged-access-management/
1 page
How Data Access Governance Compliments Privileged Access Management
how-active-directory-is-evolving-in-2018/
1 page
How Active Directory is Evolving in 2018
top-10-signs-that-your-system-has-been-compromised/
1 page
Top 10 Signs That Your System Has Been Compromised
the-pros-and-cons-of-being-a-system-administrator/
1 page
The Pros and Cons of Being a System Administrator
understanding-windows-event-forwarding/
1 page
What is Windows Event Forwarding
end-user-self-service-through-scsm-portal-but-is-it-enough/
1 page
End user self service through SCSM portal- But is it enough?
hipaa-compliance-a-guide-and-checklist/
1 page
HIPAA Compliance Audit Checklist
what-is-cloud-ransomware-and-best-practices-to-protect-against-it/
1 page
What is Cloud Ransomware and Best Practices to Protect Against It
how-to-detect-ransomware/
1 page
How to Detect Ransomware: Common Detection Techniques
gdpr-privacy-obligations-for-controllers-and-processors/
1 page
GDPR Privacy Obligations for Controllers and Processors
consumer-privacy-rights-under-gdpr/
1 page
Consumer Privacy Rights Under GDPR
how-to-meet-hipaa-compliance-when-using-cloud-platforms/
1 page
How to Meet HIPAA Compliance When Using Cloud Platforms
what-is-hitech-compliance-and-how-to-meet-its-requirements/
1 page
What is HITECH Compliance and How to Meet Its Requirements
what-is-the-childrens-online-privacy-protection-act-coppa-and-how-to-comply/
1 page
What is the Children’s Online Privacy Protection Act (COPPA) and How to Comply
what-is-the-virginia-consumer-data-protection-act-and-where-do-you-start/
1 page
What is the Virginia Consumer Data Protection Act and Where Do You Start?
how-to-choose-the-right-compliance-management-solution/
1 page
How to Choose the Right Compliance Management Solution
what-is-the-shield-act-and-tips-for-achieving-shield-compliance/
1 page
What is the SHIELD Act: Tips for Achieving SHIELD Compliance
glba-compliance-checklist/
1 page
GLBA Compliance Checklist
how-to-report-hipaa-breaches/
1 page
How to Report HIPAA Breaches
understanding-the-hipaa-minimum-necessary-standard/
1 page
Understanding the HIPAA Minimum Necessary Standard
what-is-cmmc-compliance-introduction-and-checklist/
1 page
What is CMMC Compliance? Introduction and Checklist
what-is-iso-27001-compliance-a-complete-guide/
1 page
What is ISO 27001 Compliance? A Complete Guide
what-is-glba-compliance/
1 page
What is GLBA Compliance? The Gramm-Leach-Billey Act of 2019
what-is-sox-compliance-and-what-are-the-requirements/
1 page
What is SOX Compliance? Requirements, Checklist & Benefits
the-lepide-guide-to-ferpa-compliance/
1 page
The Lepide Guide to FERPA Compliance
what-is-the-new-york-shield-act-how-to-be-compliant/
1 page
What is the New York SHIELD Act? How to Be Compliant
what-is-the-ccpa-california-consumer-privacy-act/
1 page
What is the CCPA (California Consumer Privacy Act)?
how-can-technology-help-with-iso-27001-compliance/
1 page
How Can Technology Help with ISO 27001 Compliance?
what-lessons-can-we-learn-from-recent-gdpr-fines/
1 page
What Lessons Can We Learn from Recent GDPR Fines?
navigating-the-data-security-threats-and-compliance-challenges/
1 page
Navigating the Data Security Threats and Compliance Challenges
is-your-company-failing-to-comply-with-glba/
1 page
Is Your Company Failing to Comply with GLBA?
15-questions-to-answer-for-hipaa-compliance/
1 page
15 Questions to Answer for HIPAA Compliance
data-classification-for-gdpr/
1 page
Data Classification for GDPR: How Classification Can Help You Comply with Regulations
what-are-the-latest-amendments-to-the-ccpa/
1 page
What Are the Latest Amendments to the CCPA?
enforcing-hipaa-might-just-be-getting-easier/
1 page
Enforcing HIPAA Might Just Be Getting Easier
sb-220-nevadas-new-privacy-law-and-how-it-compares-to-the-ccpa/
1 page
SB 220: Nevada’s New Privacy Law and How it Compares to the CCPA
how-the-gdpr-can-benefit-organizations-in-the-usa/
1 page
How the GDPR Can Benefit Organizations in the USA
gdpr-one-year-anniversary-what-have-we-learnt/
1 page
GDPR One Year Anniversary – What Have We Learned?
gdpr-subject-access-requests-why-are-companies-failing-to-respond/
1 page
GDPR Subject Access Requests: Why Are Companies Failing to Respond?
the-hipaa-security-rule-explained/
1 page
The HIPAA Security Rule Explained
does-hipaa-compliance-actually-help-protect-sensitive-data/
1 page
Does HIPAA Compliance Actually Help Protect Sensitive Data?
whats-the-difference-between-ccpa-and-gdpr/
1 page
CCPA vs GDPR: Similarities and Differences Explained
is-gdpr-working-rise-in-reported-data-breaches-suggests-so/
1 page
Is GDPR Working? Rise in Reported Data Breaches Suggests So
why-most-organizations-still-not-gdpr-compliant/
1 page
Most Organizations Still Not GDPR Compliant – Here’s Why
gdpr-questions-what-is-the-right-to-be-forgotten/
1 page
GDPR Questions: What is the Right to be Forgotten?
compliance-does-not-equal-security-heres-why/
1 page
Compliance Does NOT Equal Security: Here’s Why
hipaa-compliance-how-to-avoid-getting-caught-out/
1 page
HIPAA Compliance – how to avoid getting caught out
new-compliance-regulations-and-their-implications-on-your-business/
1 page
New Compliance Regulations and their Implications on Your Business
protecting-credit-card-data-should-be-a-top-priority/
1 page
Protecting Credit Card Data Should be a Top Priority
ten-ways-to-improve-data-security/
1 page
10 Ways to Improve Data Security
what-is-conti-ransomware-and-how-to-react/
1 page
What is Conti Ransomware and How to React
early-warning-signs-of-a-ransomware-attack/
1 page
10 Warning Signs of a Ransomware Attack in Progress
what-is-ryuk-ransomware-and-how-dangerous-is-it/
1 page
What is Ryuk Ransomware and How It Works?
ransomware-vs-cryptojacking/
1 page
Ransomware VS Cryptojacking
ransomware-should-you-pay-the-ransom/
1 page
Ransomware: Should you Pay the Ransom?
best-practices-for-your-data-breach-incident-response-plan/
1 page
Data Breach Incident Response Plan Best Practices
what-is-a-data-protection-impact-assessment-dpia/
1 page
What is a Data Protection Impact Assessment (DPIA)?
how-to-prevent-employee-data-theft/
1 page
How to Prevent Employee Data Theft
why-business-email-compromise-is-a-huge-risk-to-data-security-in-2020/
1 page
Why Business Email Compromise is a Huge Risk to Data Security in 2020
what-are-open-shares-and-how-fixing-open-shares-can-improve-data-security/
1 page
What are Open Shares and How Fixing Open Shares Can Help Improve Data Security
why-group-policy-auditing-is-important/
1 page
Why Group Policy Auditing is Important
3-ways-the-role-of-the-ciso-will-evolve-over-the-next-few-years/
1 page
3 Ways the Role of the CISO Will Evolve Over the Next Few Years
the-biggest-piece-security-advice-for-cisos-in-2019/
1 page
The Biggest Piece Security Advice for CISOs in 2019
5-assumptions-cisos-make-that-may-threaten-data-security/
1 page
5 Assumptions CISOs Make That May Threaten Data Security
how-cisos-can-talk-to-the-rest-of-the-board-about-data-security/
1 page
How CISOs Can Talk to the Rest of the Board About Data Security
why-dont-we-secure-our-data-in-the-same-way-that-we-secure-our-money/
1 page
Why Don’t We Secure Our Data in the Same Way That We Secure Our Money?
the-pressure-on-cisos-is-ramping-up/
1 page
The Pressure on CISOs is Ramping Up
are-cisos-prepared-to-detect-cyber-security-breaches/
1 page
Are CISOs Prepared to Detect Cyber-Security Breaches?
what-cisos-can-learn-from-the-yahoo-data-breach-fine/
1 page
What CISOs Can Learn from the Yahoo Data Breach Fine
security-policies-cisos-must-implement/
1 page
Security Policies CISOs Must Implement
how-cisos-are-adapting-to-meet-the-rising-threat-of-a-cyber-attack/
1 page
How CISOs are Adapting to Meet the Rising Threat of a Cyber-Attack
the-hafnium-breach-microsoft-exchange-server-attack/
1 page
The Hafnium Breach – Microsoft Exchange Server Attack
why-complexity-is-the-biggest-enemy-of-data-security/
1 page
Why Complexity is the Biggest Enemy of Data Security
why-the-real-estate-industry-could-do-more-to-secure-data/
1 page
Why the Real Estate Industry Could Do More to Secure Data
new-survey-reveals-the-importance-of-cybersecurity-automation/
1 page
New Survey Reveals the Importance of Cybersecurity Automation
employee-mistakes-are-your-biggest-data-security-threat/
1 page
Employee Mistakes Are Your Biggest Data Security Threat
the-biggest-cybersecurity-concerns-for-the-legal-sector/
1 page
The Biggest Cybersecurity Concerns for the Legal Sector
have-the-data-breaches-in-q1-2019-taught-us-anything/
1 page
Have the Data Breaches in Q1 2019 Taught Us Anything?
5-ways-to-improve-sharepoint-security/
1 page
SharePoint Security Best Practices – A Complete Guide
whats-the-difference-between-share-and-ntfs-permissions/
1 page
NTFS Permissions vs Share Permissions – The Key Differences
3-ways-monitoring-exchange-online-improves-security/
1 page
3 Ways Monitoring Exchange Online Improves Security
aggregating-auditing-data-from-multiple-cloud-services-using-a-dcap-solution/
1 page
Aggregating & Auditing Data from Multiple Cloud Services Using a DCAP Solution
why-now-is-the-time-for-a-data-centric-security-strategy/
1 page
Why Now is the Time for a Data-Centric Security Strategy
what-is-data-centric-audit-and-protection-dcap/
1 page
What is Data-Centric Audit and Protection (DCAP)?
why-it-is-important-to-keep-an-eye-on-your-office-365-administrators/
1 page
Why It Is Important to Keep an Eye on Your Office 365 Administrators
why-it-is-important-to-know-where-your-data-flows/
1 page
Why it is Important to Know Where Your Data Flows
why-native-auditing-fails-when-it-comes-to-group-policy-auditing/
1 page
Why Native Auditing Fails When It Comes to Group Policy Auditing
the-threat-of-unstructured-data/
1 page
The Threat of Unstructured Data
most-companies-think-their-active-directory-is-secure-until-they-talk-to-us/
1 page
Most Companies Think Their Active Directory is Secure Until They Talk to Us
poor-visibility-and-weak-passwords-are-putting-active-directory-at-risk/
1 page
Poor Visibility and Weak Passwords are Putting Active Directory at Risk
eight-ways-lepide-trumps-native-auditing/
1 page
8 Ways Lepide Trumps Native Auditing
overcoming-common-visibility-issues-with-exchange-server-auditing/
1 page
Overcoming Common Visibility Issues with Exchange Server Auditing
top-10-things-to-audit-in-active-directory/
1 page
Active Directory Auditing: What to Audit and Best Practices
effectively-manage-network-wide-event-collection-and-auto-correlation/
1 page
Effectively manage Network wide event collection and auto-correlation
5-ways-to-secure-electronic-health-records/
1 page
5 Ways to Secure Electronic Health Records
8-different-methods-to-identify-privileged-users/
1 page
How to Find Privileged User Accounts in Active Directory
how-can-financial-services-sector-be-protected-from-cyber-crime/
1 page
How can Financial Services Protect Themselves from Cybercrime
understanding-internal-controls-in-the-finance-industry/
1 page
Understanding Internal Controls in the Finance Industry
the-biggest-threat-to-your-it-security-employee-negligence/
1 page
The Biggest Threat to Your IT Security? Employee Negligence
1
2