• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

Security Information and Event Management | October 14, 2021

Watch out for tenants living off your land

The cyberworld has witnessed and defended against several forms of attacks. Some of the...

Log360 | September 9, 2021

How Kaseya fell victim to a ransomware attack

On July 2, 2021, the cybersecurity world woke up to yet another ransomware attack—this...

Why companies need URL filtering for enhanced cloud protection

DataSecurity Plus | June 28, 2021

Why companies need URL filtering for enhanced cloud protection

The cloud landscape is rife with unsafe URLs and inappropriate content. This—coupled with...

The role of endpoints in the security of your network

Log360 | June 21, 2021

The role of endpoints in the security of your network

Endpoint security is a hot topic of discussion, especially now with so many businesses...

Resolve network security issues efficiently with the Firewall Analyzer-ServiceDesk Plus integration

Firewall Analyzer | June 3, 2021

Resolve network security issues efficiently with the Firewall Analyzer-ServiceDesk Plus integration

ManageEngine Firewall Analyzer reviews firewall logs to capture network security threats....

Building a complete network security checklist

Log360 | May 24, 2021

Building a complete network security checklist

Understanding what to audit in a network can be chaotic and confusing. Building a complete...

Healthcare cybersecurity: Our 6-step plan to secure healthcare data

DataSecurity Plus | May 19, 2021

Healthcare cybersecurity: Our 6-step plan to secure healthcare data

The HIPAA Journal reported that "2020 was the worst ever year for healthcare industry data...

Azure security 101: Security essentials, logs, authentication, and more

Log360 | March 30, 2021

Azure security 101: Security essentials, logs, authentication, and more

“Where necessity speaks, it demands”. This old saying seems particularly apt right now...

Windows logon auditing: Everything you need to know in only 10 minutes [Free e-book]

ADAudit Plus | March 24, 2021

Windows logon auditing: Everything you need to know in only 10 minutes [Free e-book]

User logon activity needs to be audited to meet various security, operational, and...

Ransomware in 2021: What has changed? Detection and mitigation strategy

Log360 | March 10, 2021

Ransomware in 2021: What has changed? Detection and mitigation strategy

A ransomware attack is a bug that we can't shake off. Or perhaps, it can even be called a...

Log360 | March 3, 2021

Security operations center, Part 3: Finding your weakest link

Any organization with data assets is a possible target for an attacker. Hackers use...

Dangerous defaults that put your IT environment at risk: IT security under attack

Log360 | February 18, 2021

Dangerous defaults that put your IT environment at risk: IT security under attack

In this blog in the “IT security under attack” series, we wanted to shed some light on an...

Page 10 of 50« First«...89101112...»Last »