KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!
New Chainsaw Tool Helps IR Teams Analyze Windows Event Logs Incident responders and blue teams have a new tool called Chainsaw that speeds up searching through Windows event log records to identify threats. The tool is designed to assist in the first-response stage of a security engagement and can also help blue teams triage entries
What is Data Sovereignty and how does it apply to your business? Oracle, a renowned database management system, stated how “the exponential growth of data crossing borders and public cloud regions [has seen], more than 100 countries now have passed regulations.” This is of course pertaining to the access and control of information across countries.
Windows 11 Dark Mode Has Quieter, More Soothing Sounds – Listen Now Windows 11 brings a redesigned user interface and an overhaul to the system sounds, including different sounds for Light Mode and Dark Mode. When developing Windows 11, the Microsoft audio team developed new system sounds designed to provide a calm experience while still
Office 365 To Let Admins Block Active Content on Trusted Docs Microsoft plans to allow Office 365 admins ensure that end-users can’t ignore organization-wide policies set up to block active content on Trusted Documents. Redmond says trusted docs are files with active content (e.g., ActiveX controls, macros, and Dynamic Data Exchange (DDE) functions that don’t