January 22, 2019
A Slack breach would be a nightmare in terms of exposed sensitive data. Here's how to lock down your Slack workspaces. Read more â¶
Review: GreatHorn offers a better way to secure enterprise email
5 steps to simple role-based access control (RBAC)
How automation enables a proactive security culture at Bank of England
Building your forensic analysis toolset
Why AI-based threat detection hasnât taken over the market ⦠yet
How to enable audit logs in Microsoft Office 365
A transformation to a more globally dispersed, flexible and remote workforce is happeningâin some companies more rapidly than others. Read more â¶
GreatHorn takes a modern and highly effective approach to protecting enterprise email that goes well beyond the capabilities of legacy mail scanners. Read more â¶
FROM OUR BUSINESS PARTNERS
Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now. Read more â¶
RBAC is the idea of assigning system access to users based on their role in an organization. It's important to remember that not every employee needs a starring role. Read more â¶
The Bank of England security team uses automation to build intellectual capital, freeing up time to be more proactive and to better explain security to business units. Read more â¶
Every security team should have these types of digital forensics tools available. Many are free, and there are enough options to find one that suits your skills and approach. Read more â¶
Vendors, analysts and buyers differ on why threat detection AI isn't more widely adopted, but they agree that it needs to provide better insight to its inner workings. Read more â¶
Audit logging of Office 365 mail reads makes forensics investigations of attacks much easier. Here's how to make sure it's enabled. Read more â¶
Millennials may be new to the modern work environment, but their fresh perspective is raising the bar on productivity. Read more â¶