![https://www.lepide.com/blog/wp-content/uploads/2024/07/blog-small-1.jpg](https://www.lepide.com/blog/wp-content/uploads/2024/07/blog-small-1.jpg)
The cybersecurity industry is an alphabet soup of security acronyms and categories, with vendors and… Read More
![https://www.lepide.com/blog/wp-content/uploads/2024/06/blog-small-5.jpg](https://www.lepide.com/blog/wp-content/uploads/2024/06/blog-small-5.jpg)
What is Security Service Edge (SSE)? Introduced by Gartner in its 2021 Roadmap for SASE… Read More
![https://www.lepide.com/blog/wp-content/uploads/2024/04/event-id-4773-small.jpg](https://www.lepide.com/blog/wp-content/uploads/2024/04/event-id-4773-small.jpg)
Event ID 4773 – A Kerberos Service Ticket Request Failed
April 8, 2024, General
Kerberos is an authentication protocol which is used to verify the identity of a host… Read More
![https://www.lepide.com/blog/wp-content/uploads/2024/03/powershell-guide-small.jpg](https://www.lepide.com/blog/wp-content/uploads/2024/03/powershell-guide-small.jpg)
Windows PowerShell Scripting Beginner Tutorial
March 18, 2024, General
Have you ever found yourself wishing you could automate those repetitive tasks that seem to… Read More
![https://www.lepide.com/blog/wp-content/uploads/2024/03/remote-work-security-small.jpg](https://www.lepide.com/blog/wp-content/uploads/2024/03/remote-work-security-small.jpg)
In the aftermath of the COVID-19 pandemic, cybersecurity has become a top concern for businesses.… Read More
![https://www.lepide.com/blog/wp-content/uploads/2024/02/ad-naming-small.jpg](https://www.lepide.com/blog/wp-content/uploads/2024/02/ad-naming-small.jpg)
Common Active Directory Naming Limitations
February 16, 2024, General
Active Directory’s database has specific rules for naming computer objects, which can clash with the… Read More