Latest from Quest

The Proactive CISO’s Playbook: How to close the Exposure Gap and Manage Cyber Risk with Confidence

Trend Micro’s “The Proactive CISO’s Playbook” guides CISOs in shifting from reactive security to strategic leadership. It emphasizes incident readiness, cross-functional collaboration, and continuous improvement. By adopting a proactive, assume-breach mindset, CISOs can build resilient organizations, foster transparency, and drive board-level engagement in cybersecurity.

Read →

The Business Value of Nutanix Cloud Platform

IDC surveyed organizations about their experiences with the Nutanix Cloud Platform (NCP) versus their previous approach to infrastructure, then quantified the differences. This IDC white paper shares details that you can use to understand the improvements in agility, efficiency, scalability, and availability that come with using Nutanix solutions built on hyperconverged infrastructure (HCI). Download the […]

Read →

Nonprofit leaders realizing the promise of AI

Nonprofits are the unsung heroes of communities around the world—and they deserve access to technology that helps them make the most impact. This research paper will be invaluable for nonprofit leaders looking for tech strategies with the most potential to help them advance their missions with limited resources. Learn best practices of AI “Pacesetters” already […]

Read →

How to Manage ‘Teams Sprawl’

In this era of remote working, the adoption and popularity of Microsoft Teams is soaring. Unfortunately, many organizations enable Teams sprawl by allowing users to create Teams with no oversight or planning. This lack of governance leads to seldom-used or dead Teams, empty channels, and data scattered all over chats, channels and files tabs. In […]

Read →

Maintaining the Health of Your Active Directory Infrastructure

Maintaining the health of your production AD environment is key to its performance, availability and security. The health of your AD infrastructure is also crucial for preventing roadblocks to significant IT changes like adding new applications, network upgrades, cloud migrations, or supporting a merger, acquisition or divestiture. This white paper is intended to provide insights […]

Read →

Lessons Learned From a Recent Ransomware Recovery

Today’s headlines are filled with harrowing stories of successful ransomware attacks — and less than successful ransomware recovery efforts. However, some organizations do restore operations swiftly. What are their secrets? Read this white paper to learn about a ransomware attack on a global manufacturing company. Even though 17 Active Directory domain controllers across multiple continents […]

Read →

Exchange Server Exploits: How to Spot and Stop Vulnerabilities Resulting From HAFNIUM Attacks

True, false or maybe? • If you use Exchange Online, then HAFNIUM and the Exchange Server exploit do not affect you.• The most likely consequence of the exploit is credential dumping.• If you’ve been attacked through the exploit, the best practice is to rebuild Active Directory. Attacks against multiple vulnerabilities in Exchange Server have left […]

Read →
25,000+
Articles
500K+
Monthly Readers
300+
Sponsors
15+
Years of Insights