• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Tags:cloud security

Mastering cloud app control, Part 3: Governing file transfers

DataSecurity Plus | November 19, 2025

Mastering cloud app control, Part 3: Governing file transfers

In Part 1 and Part 2 of the cloud app control blog series, we saw how SinaraTech, a mid...

Mastering cloud app control, Part 2: Hardening login security

DataSecurity Plus | November 12, 2025

Mastering cloud app control, Part 2: Hardening login security

In Part 1 of the cloud app control series, we explored how SinaraTech, a mid-sized...

Mastering cloud app control, Part 1: Locking down access

DataSecurity Plus | November 3, 2025

Mastering cloud app control, Part 1: Locking down access

When it comes to managing cloud application usage in an organization, the challenges are...

IT Security Under Attack: The ultimate playbook to counter cyberthreats

Log360 | February 26, 2025

IT Security Under Attack: The ultimate playbook to counter cyberthreats

An employee checks their inbox and notices an email from HR with a worrying subject line...

PAM360 now includes native cloud infrastructure entitlements management capabilities

General | November 26, 2024

PAM360 now includes native cloud infrastructure entitlements management capabilities

We are elated to announce the successful completion of PAM360's Cloud Infrastructure...

The states of data, Part 4: Securing data in motion through treacherous transits

DataSecurity Plus | October 17, 2024

The states of data, Part 4: Securing data in motion through treacherous transits

In our previous blog, Data in use and why you need to keep an eye on file activities, we...

Five worthy reads: Cybersecurity in the age of AI — Battling sophisticated threats

General | July 28, 2023

Five worthy reads: Cybersecurity in the age of AI — Battling sophisticated threats

Five worthy reads is a regular column on five noteworthy items we have discovered while...

Data sovereignty in the cloud: A Canadian perspective

General | April 3, 2023

Data sovereignty in the cloud: A Canadian perspective

Cloud computing has made its way to organizations' IT infrastructure strategy rapidly...

Log360 | December 27, 2022

Year in review: ManageEngine Log360's analyst recognition from 2022

Cyberattacks have intensified over the last few years as threat actors are always...

General | March 14, 2022

Why SASE is your best bet to secure a remote workspace

The origins of Secure Access Service Edge (SASE) can be traced back to 2019, when legacy...

Five worthy reads: Confidential computing - The way forward in cloud security

General | June 11, 2021

Five worthy reads: Confidential computing - The way forward in cloud security

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

The US National Security Agency's best practices for securing your cloud environment

CloudSecurity Plus | March 2, 2020

The US National Security Agency's best practices for securing your cloud environment

Cloud technology has seen massive advances in recent years, and it's only getting more...

Page 1 of 212»Last »