Find here the articles and actionable information you need to simplify complex IT challenges.

How to remove weaknesses from your security posture to increase resilience
At the bottom of the cybersecurity stack, in most medium and large corporations around the world, there is an Active Directory (or many Active Directories). Though many, including Microsoft, call AD a legacy application, the number of critical applications still using it is staggering. Last month at the Hybrid Identity Protection Global 2023 conference, the […]
At the bottom of the cybersecurity stack, in most medium and large corporations around the world, there is an …
At the bottom of the cybersecurity stack, in most medium and large corporations around the world, there is an Active Directory (or many Active …
At the bottom of the cybersecurity stack, in most medium and large corporations around the world, there is an Active Directory (or many Active …