Hiranmayi Krishnan

Hiranmayi Krishnan

Cybersecurity Specialist, ManageEngine  

Hiranmayi is a cybersecurity specialist at ManageEngine, the IT management division of Zoho Corporation. A thought leader and an accomplished writer, she has authored numerous blogs, articles, and e-books exploring the latest trends and challenges in cybersecurity. Her expertise focuses on User and Entity Behavior Analytics, and Cybersecurity Strategy and Leadership. Through her work, Hiranmayi aims to empower businesses with actionable insights to strengthen their security posture and stay ahead of emerging threats.

More by Hiranmayi krishnan

Articles Guides Infographics
 
Threatscape

Threatscape

Marks & Spencer ransomware attack: Cybersecurity lessons for the retail sector

 
The importance of context in UEBA for enterprise security

Tech central

The importance of context in UEBA for enterprise security

 
The role of network traffic analysis in detecting APTs in enterprise networks

Tech central

The role of network traffic analysis in detecting APTs in enterprise networks

 
Cloud misconfigurations: The silent threats to enterprise security

Tech central

Cloud misconfigurations: The silent threats to enterprise security

 
Anomaly detection in hybrid clouds: The role of UEBA in securing complex enterprise environments

Tech central

Anomaly detection in hybrid clouds: The role of UEBA in securing complex enterprise environments

 
Healthcare

Healthcare

Cybersecurity in telehealth: A strategic guide for CISOs in healthcare

 
Detecting and preventing DDoS attacks in educational networks

Education

Detecting and preventing DDoS attacks in educational networks

 
Threatscape

Threatscape

Finastra data breach: Lessons for financial sector cybersecurity

 
Threatscape

Threatscape

Bell Ambulance ransomware attack: A critical hit to emergency services security

 
Videocasts

Threatscape

The cost of poor cybersecurity: Star Health breach and CISO best practices

 
Cybersecurity in genomics and personalized medicine platforms

Healthcare

Cybersecurity in genomics and personalized medicine platforms

 
Cybersecurity in financial services

BFSI

Cybersecurity in financial services

 
IT Doesn't Matter by Nicholas Carr: A clear paradox?

Security fundamentals

"IT Doesn't Matter" by Nicholas Carr: A clear paradox?

 
Cybersecurity threats in Indian healthcare: 6 strategies to tackle them

Guides

Cybersecurity threats in Indian healthcare: 6 strategies to tackle them

 
CISO handbook: Cybersecurity metrics, budgeting, and leadership

Guides

CISO handbook: Cybersecurity metrics, budgeting, and leadership

 
How to improve risk scoring and threat detection with UEBA

Guides

How to improve risk scoring and threat detection with UEBA

 
How to detect and respond to cryptojacking attacks

Guides

How to detect and respond to cryptojacking attacks

 
Steps to conduct an effective cyberwar game for a CISO

Infographics

Steps to conduct an effective cyberwar game for a CISO

 
6 reasons why healthcare is an attractive target for cyberattacks

Infographics

6 reasons why healthcare is an attractive target for cyberattacks

 
6 strategies for IT security managers to improve cybersecurity posture in healthcare

Infographics

6 strategies for IT security managers to improve cybersecurity posture in healthcare

 
6 tactical steps to secure healthcare data

Infographics

6 tactical steps to secure healthcare data

 
Top 5 anomalous activities security teams should track

Infographics

Top 5 anomalous activities security teams should track

 
10 AWS activities to track for improved cloud security in healthcare

Infographics

10 AWS activities to track for improved cloud security in healthcare

 
Role of blockchain technology in cryptomining

Infographics

Role of blockchain technology in cryptomining

 
Combating cryptojacking with ManageEngine Log360

Infographics

Combating cryptojacking with ManageEngine Log360

×