Browse through articles, blog posts, news, papers, videos and even events about cybersecurity, technology and the current threat landscape.
Enterprise SOC services that protect, comply, and grow with your business.
Cloud Security Monitoring As more organizations are moving their data to the cloud, it has
Emotet malware, one of the most notorious and dangerous strains of malware, made headlines last
As cyber threats continue to increase, it is becoming increasingly important for organizations to implement
How Vijilan Security Can Help with CMMC Compliance for Defense Contractors As cyber-attacks continue to
Reducing Cyber Threats with Geoblocking In today’s digital landscape, businesses are facing an increasing number
Palo Alto Next-Generation Firewalls Integration: Automated Threat Detection & Response In today’s rapidly evolving threat
NTLM Relay Attack PetitPotam Targets AD Certificate Services The PetitPotam attack is a new type
What is Web Shell? Web shells are malicious scripts that are designed to allow attackers
A Cybersecurity Checklist for MSPs Managed Service Providers (MSPs) play a critical role in helping
Vijilan Release Day 2023 Our CEO, Kevin (KayVon) Nejad, has some incredible updates to share with you about Vijilan’s accomplishments and our exciting future! Looking ahead, Vijilan has big plans to revolutionize the cyber defense landscape! We are committed to staying at the forefront of technology and innovation to provide unparalleled protection for our valued partners. The future is promising
Mastering SOAR, SIEM, SOC, MDR, EDR & XDR for Comprehensive Protection In today’s digital age, businesses rely heavily on technology and computer systems to manage their operations. However, with the increase in technology use comes an increase in cyber threats. In order to protect their assets, businesses must employ various cybersecurity strategies and tools. Five commonly used cybersecurity terms are
Best Practices Against Kerberos Attacks Active Directory (AD) is a central component of many organizations’ IT infrastructure. It’s used to manage users, groups, and computers, as well as to authenticate and authorize access to network resources. However, it’s also a prime target for cyberattacks, including Kerberos attacks. In this blog post, we’ll explore what these attacks are, how they work,
As remote desktop protocol (RDP) attacks continue to rise, businesses must take steps to protect themselves from potential threats. One effective way to do so is by using honeypots. This are decoy systems that simulate vulnerabilities to attract potential attackers and allow security teams to detect and analyze potential threats. In this blog post, we’ll discuss how Vijilan Security can
How Vijilan Security Detection Rule Management System In today’s digital age, cybersecurity threats have become a major concern for businesses of all sizes. Cyberattacks have the potential to cripple businesses, leading to loss of revenue, reputation, and customer trust. As a result, many companies are investing in advanced security services to protect their data, networks, and applications. However, managing security
Can Help You Defend Against the Rise in Office 365 Attacks Office 365 is a popular cloud-based productivity suite used by millions of businesses worldwide. However, as with any widely used technology, Office 365 is a target for cybercriminals. In recent years, there has been a significant rise in Office 365 attacks, with cybercriminals using a range of tactics to
As cyber-attacks become increasingly sophisticated, organizations must go beyond traditional cybersecurity measures to protect their sensitive data. Cybersecurity deception techniques are a powerful tool for organizations looking to add an extra layer of defense against cyber threats. In this blog post, we will provide a guide to cybersecurity deception techniques and how Vijilan Security can help you implement them. What
When Firewalls Aren’t Enough Firewalls are a crucial component of any cybersecurity defense strategy, but they are not foolproof. Hackers are constantly developing new techniques to get through firewalls and gain access to sensitive information. In this blog post, we will discuss five ways hackers can get through firewalls and how Vijilan Security can help protect your organization. Social Engineering
High Fidelity Application-Level Logging vs. Host-Based Logging Logging plays a crucial role in software development and system administration, providing valuable insights into the behavior and performance of applications and systems. Two commonly used logging approaches are high-fidelity application-level logging and host-based logging. This document aims to compare and contrast these two logging techniques, highlighting their respective advantages and use cases.
Vijilan’s Partner Portal is your gateway to access all the products and services that are available from Vijilan.
Vijilan’s Portal is your gateway to access all the products and services that are available from Vijilan.