Cybersecurity Expert Talks

  • How cron jobs can be con jobs
    SIEM Feb 16, 2024 7 min

    How cron jobs can be con jobs

    Routines like data backups, cache clearing, and other tasks can easily be managed with task automation tools. Task schedulers, cron jobs, and similar automation utilities help administrators achieve just that. Once these automations are scheduled, an array of administrative tasks are executed without missing a beat.

    Read more 
  • 10 cybersecurity misconfigurations your SOC team must be wary about
    SIEM Feb 02, 2024 6 min

    10 cybersecurity misconfigurations your SOC team must be wary about

    Have you ever heard of the 80/20 rule? The 80/20 rule, also known as the Pareto Principle, was put forth by the Italian economist, Vilfredo Pareto. It states that 80% of the consequences come from 20% of the causes, be it positive or negative. Though it isn't a proven law, the Pareto rule has been empirically observed in numerous facets of business.

    Read more 
  • Securing your Active Directory against chaos
    Attack detection Jan 30, 2024 8 min

    Securing your Active Directory against chaos

    Expert Talks HomeAttack DetectionSecuring your Active Directory against chaos Have you come across chaos theory? Chaos theory, summarized by Edward Lorenz, an American mathematician, addresses the behavior of complex systems like weather and the stock market. It can also be applicable to the human brain, another complex system.

    Read more 
  • Is your organization HIPAA compliant? Calculate your HIPAA compliance score to find out
    SIEM Jan 24, 2024 7 min

    Is your organization HIPAA compliant? Calculate your HIPAA compliance score to find out

    The United States healthcare sector has experienced a steady rise in both volume and cost of data breaches in recent years.

    Read more 
  • Common indicators of compromise every SOC team should watch out for
    Attack detection Jan 23, 2024 8 min

    Common indicators of compromise every SOC team should watch out for

    Expert Talks HomeAttack DetectionCommon indicators of compromise every SOC team should watch out for Forensics are an integral part of discovering how a cybercrime took place. As a SOC manager, you and your team have to rely on digital forensic clues (IP addresses, file hashes, etc.) to figure out if a cybercrime has taken place, and how an attacker went about it.

    Read more 

Featured Articles

  • phishing-malware-valentines-day-2022
    SIEM Nov 08, 2023 6 min

    Cyber detective: Hunting for threats in the digital wilderness

    Read more 
  • 5 cognitive biases that affect your cybersecurity decisions
    SIEM Jun 28, 2022 6 min

    5 cognitive biases that affect your cybersecurity decisions

    Read more 
  • Calculating the cost savings of a SIEM solution
    SIEM Nov 04, 2022 6 min

    Calculating the cost savings of a SIEM solution

    Read more 
  • Cyber swachh Bharat: Cybersecurity policies over the last 76 years in India
    SIEM Aug 14, 2023 6 min

    Cyber swachh Bharat: Cybersecurity policies over the last 76 years in India

    Read more 

New Posts

  • Attack surface expansion: A closer look

     
  • Anticipating the future: Top 10 cybersecurity trends for 2024

     
  • SIEM 6 min

    Unlocking the full potential of security teams with autonomous SOC technology

     

About Expert Talks

Organizations nowadays need to upgrade their threat detection and response capabilities. Lack of experience and knowledge about the current cybersecurity landscape can cost you millions of dollars. But with a strong security strategy, it's definitely possible to prevent that from happening.

ManageEngine Expert Talks is here just to do that.

We deliver content that help you devise the best cybersecurity strategies to help you think ahead of any possible attacks.

Looks interesting?

Subscribe to the best source of information on cybersecurity.

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  •  
  •  
    By clicking on Keep me Updated you agree to processing of personal data according to the Privacy Policy.

SIEM

See all
  • How cron jobs can be con jobs
    SIEM Feb 16, 2024 7 min

    How cron jobs can be con jobs

    Routines like data backups, cache clearing, and other tasks can easily be managed with task automation tools. Task schedulers, cron jobs, and similar

    Read more 
  • 10 cybersecurity misconfigurations your SOC team must be wary about
    SIEM Feb 02, 2024 6 min

    10 cybersecurity misconfigurations your SOC team must be wary about

    Have you ever heard of the 80/20 rule? The 80/20 rule, also known as the Pareto Principle, was put forth by the Italian economist,

    Read more 
  • How to communicate your SOC's ROI and justify your security team's value
    SIEM Jan 24, 2024 7 min

    Is your organization HIPAA compliant? Calculate your HIPAA compliance score to find out

    The United States healthcare sector has experienced a steady rise in both

    Read more 

Attack detection

See all
  • Securing your Active Directory against chaos
    Attack detection Jan 30, 2024 8 min

    Securing your Active Directory against chaos

    Have you come across chaos theory? Chaos theory, summarized by Edward Lorenz,

    Read more 
  • Common indicators of compromise every SOC team should watch out for
    Attack detection Jan 23, 2024 8 min

    Common indicators of compromise every SOC team should watch out for

    Forensics are an integral part of discovering how a cybercrime took place.

    Read more 
  • The shell game: A deep dive into detecting PowerShell attacks—Part 3
    Attack detection Dec 14, 2023 8 min

    The shell game: A deep dive into detecting PowerShell attacks—Part 3

    Have you ever seen a shell game being played? Nobody but the swindler

    Read more 

Cloud Security

See all
  • The high price of careless cloud app usage
    Cloud Security May 11, 2022 4 min

    The high price of careless cloud app usage

    If you believe internal attacks are caused only by malicious insiders, think again. According to a Ponemon Institute report from 2022, employee...

    Read more 
  • CASBs for multi-cloud
    Cloud Security Apr `5, 2022 4 min

    CASBs for multi-cloud

    Security is a big issue IT teams face when it comes to multi-cloud management. A cloud access security broker (CASB) provides organizations with a much-needed opportunity...

    Read more 
  • Shedding light on shadow IT and data exfiltration with CASB
    Cloud Security Feb 10, 2022 5 min

    Shedding light on shadow IT and data exfiltration with CASB

    The days when employees and assets functioned only within the company network are long gone. Now, all that is required is a username and password...

    Read more 

Data Security

See all
  • Are you prepared to protect your organization's AI against data poisoning?
    Data Security Dec 18, 2023 6 min

    Attack surface expansion: A closer look

    In the cybersecurity landscape, attack surface expansion isn't a new concept. Organizations with a digital presence..

    Read more 
  • Anticipating the future: Top 10 cybersecurity trends for 2024
    Data Security Dec 08, 2023 5 min

    Anticipating the future: Top 10 cybersecurity trends for 2024

    It's time to discuss the various trends forecast to shape cybersecurity in the next 365 days. Tech developments like generative AI

    Read more 
  • Maintaining mental well-being: The key to sustainable cybersecurity success
    Data Security Nov 08, 2023 5 min

    Maintaining mental well-being: The key to sustainable cybersecurity success

    For many years, security analysts have consistently prioritized..

    Read more 

UEBA

See all
  • One user, one risk score: User identity mapping in UEBA
    UEBA Jul 13, 2023 5 min

    One user, one risk score: User identity mapping in UEBA

    Any employee within a company may access operating systems, devices, and applications, but with different usernames and credentials.

    Read more 
  • How does risk scoring in anomaly detection work?
    UEBA Apr 24, 2023 8 min

    How does risk scoring in anomaly detection work?

    The risk appetite of every organization is different, because they all differ in what they consider to be risky and how much...

    Read more 
  • The importance of anomaly modeling when discerning user behavior
    UEBA Dec 28, 2022 6 min

    The importance of anomaly modeling when discerning user behavior

    Security analysts have to deal with genuine internal and external threats along with a stream of false positives on a daily basis.

    Read more 

Threats in three minutes

See all
  •  

    Conti ransomware

    Conti is a ransomware-as-a-service affiliate program associated with Russian threat actors. The developers of this ransomware sell or lease their ransomware technology...

    Play now
     
  •  

    Apache Log4j vulnerability

    Logging is a fundamental feature of software. A flaw in Log4j, a Java-based logging utility, has been deemed as one of the most high-profile security risks...

    Play now
     
  •  

    US government probes VPN hack within federal agencies

    On April 29, 2022, the United States government investigated a hack against federal agencies...

    Play now
     

Get the latest content delivered
right to your inbox!

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  •  
  •  
    By clicking on Keep me Updated you agree to processing of personal data according to the Privacy Policy.

EXPERT TALKS

     
     

2021 Zoho Corporation Pvt. Ltd. All rights reserved.