Configure ‘Break Glass’ Emergency Access For Azure Active Directory

Configure ‘Break Glass’ Emergency Access For Azure Active Directory

In cloud computing generally and in Microsoft Azure specifically, the shared responsibility model means that both Microsoft and you (the customer) have a role to play in ensuring service high availability. Let’s take identity, for example, Microsoft provides...
What happens when your security vendor isn’t so secure?

What happens when your security vendor isn’t so secure?

As we approach Data Privacy Day on January 28, I’ve reflected on what I’ve written in the last few months as to what happens when major businesses don’t do enough to protect consumer data, why they need to do better, etc. Today I want to explore what happens...
An Evolution of IoT Security Issues

An Evolution of IoT Security Issues

We have seen a boom in the world of the Internet of Things in the last few years – which means we have also seen an increase in security issues with said devices and networks. As we slowly transition into a world of total interconnectivity through these smart devices...
Gaming with ESET’s Advanced Machine Learning protection ‘on’

Gaming with ESET’s Advanced Machine Learning protection ‘on’

Even before the rise of online gaming, LAN parties, in which gamers create an offline network for multiplayer adventures, have offered constant appeal. From basement setups to fully organized events around the world, like DreamHack, optimizing your gaming gear for...
3 New Technologies That Will Make IT’s Life Easier In 2020

3 New Technologies That Will Make IT’s Life Easier In 2020

The future is here and now! These are the top 3 new technologies that will make IT’s life that much easier in 2020. IT staff, the tech-savvy or geeks as we are known, differ a little from the general consumer and rarely offer blind allegiance to a company,...
License-optimized Migration to SAP S/4HANA

License-optimized Migration to SAP S/4HANA

SAP is currently running an advertising campaign in the customer environment to encourage participation in the Digital Access Adoption Program (DAAP). This is to encourage companies to migrate to or introduce the new “Digital Access” model in the indirect SAP use...