Security Information and Event Management | October 14, 2021Watch out for tenants living off your land The cyberworld has witnessed and defended against several forms of attacks. Some of the...
Log360 | September 9, 2021How Kaseya fell victim to a ransomware attack On July 2, 2021, the cybersecurity world woke up to yet another ransomware attack—this...
DataSecurity Plus | June 28, 2021Why companies need URL filtering for enhanced cloud protection The cloud landscape is rife with unsafe URLs and inappropriate content. This—coupled with...
Log360 | June 21, 2021The role of endpoints in the security of your network Endpoint security is a hot topic of discussion, especially now with so many businesses...
Firewall Analyzer | June 3, 2021Resolve network security issues efficiently with the Firewall Analyzer-ServiceDesk Plus integration ManageEngine Firewall Analyzer reviews firewall logs to capture network security threats....
Log360 | May 24, 2021Building a complete network security checklist Understanding what to audit in a network can be chaotic and confusing. Building a complete...
DataSecurity Plus | May 19, 2021Healthcare cybersecurity: Our 6-step plan to secure healthcare data The HIPAA Journal reported that "2020 was the worst ever year for healthcare industry data...
Log360 | March 30, 2021Azure security 101: Security essentials, logs, authentication, and more “Where necessity speaks, it demands”. This old saying seems particularly apt right now...
ADAudit Plus | March 24, 2021Windows logon auditing: Everything you need to know in only 10 minutes [Free e-book] User logon activity needs to be audited to meet various security, operational, and...
Log360 | March 10, 2021Ransomware in 2021: What has changed? Detection and mitigation strategy A ransomware attack is a bug that we can't shake off. Or perhaps, it can even be called a...
Log360 | March 3, 2021Security operations center, Part 3: Finding your weakest link Any organization with data assets is a possible target for an attacker. Hackers use...
Log360 | February 18, 2021Dangerous defaults that put your IT environment at risk: IT security under attack In this blog in the “IT security under attack” series, we wanted to shed some light on an...