Latest from Quest

6 Lessons for Cybersecurity Leaders

The state of security is highly adrenalized these days — more so than usual. Years into the deadly and disruptive global pandemic, not only are we still seeing more attacks, we’re also seeing more breaches, as the way many of us work continues to evolve. New global research conducted by Splunk and the Enterprise Strategy […]

Read →

Nonprofit leaders realizing the promise of AI

Nonprofits are the unsung heroes of communities around the world—and they deserve access to technology that helps them make the most impact. This research paper will be invaluable for nonprofit leaders looking for tech strategies with the most potential to help them advance their missions with limited resources. Learn best practices of AI “Pacesetters” already […]

Read →

How to Manage ‘Teams Sprawl’

In this era of remote working, the adoption and popularity of Microsoft Teams is soaring. Unfortunately, many organizations enable Teams sprawl by allowing users to create Teams with no oversight or planning. This lack of governance leads to seldom-used or dead Teams, empty channels, and data scattered all over chats, channels and files tabs. In […]

Read →

Maintaining the Health of Your Active Directory Infrastructure

Maintaining the health of your production AD environment is key to its performance, availability and security. The health of your AD infrastructure is also crucial for preventing roadblocks to significant IT changes like adding new applications, network upgrades, cloud migrations, or supporting a merger, acquisition or divestiture. This white paper is intended to provide insights […]

Read →

Lessons Learned From a Recent Ransomware Recovery

Today’s headlines are filled with harrowing stories of successful ransomware attacks — and less than successful ransomware recovery efforts. However, some organizations do restore operations swiftly. What are their secrets? Read this white paper to learn about a ransomware attack on a global manufacturing company. Even though 17 Active Directory domain controllers across multiple continents […]

Read →

Exchange Server Exploits: How to Spot and Stop Vulnerabilities Resulting From HAFNIUM Attacks

True, false or maybe? • If you use Exchange Online, then HAFNIUM and the Exchange Server exploit do not affect you.• The most likely consequence of the exploit is credential dumping.• If you’ve been attacked through the exploit, the best practice is to rebuild Active Directory. Attacks against multiple vulnerabilities in Exchange Server have left […]

Read →
25,000+
Articles
500K+
Monthly Readers
300+
Sponsors
15+
Years of Insights