Hiranmayi Krishnan

Sangavi Senthil

Cybersecurity Specialist, ManageEngine  

Sangavi is a cybersecurity specialist at ManageEngine, a division of Zoho. She actively keeps herself updated in areas like SIEM, SOAR, UEBA, FIM, and cloud security. Realizing that cybersecurity will continue to grow into a necessity, she loves to utilize her articles and other forms of content to speak to readers about various topics. She primarily writes enterprise-focused pieces covering IT security trends, product features, and real-world use cases. Her role also involves contributing to product strategy planning and supporting customers in deploying solutions that align with their evolving needs.

More by Sangavi Senthil

Articles Infographics
 
Protecting student information systems: Combating exploits and data exposure with SIEM and IAM

Education

Protecting student information systems: Combating exploits and data exposure with SIEM and IAM

 
Call center fraud and social engineering risks in banking: How IAM and SIEM strengthen defenses

BFSI

Call center fraud and social engineering risks in banking: How IAM and SIEM strengthen defenses

 
The domino effect: How small changes can undermine Active Directory security and enterprise resilience

Tech central

The domino effect: How small changes can undermine Active Directory security and enterprise resilience

 
Continuous threat exposure management: A modern approach to enterprise risk

Tech central

Continuous threat exposure management: A modern approach to enterprise risk

 
Education cybersecurity in the EdTech era: Managing code dependency risks, online exam and
                            proctoring tool security, and open source software challenges

Education

Education cybersecurity in the EdTech era: Managing code dependency risks, online exam and proctoring tool security, and open source software challenges 

 
Threatscape

Threatscape

Cybersecurity breaches in healthcare: Insights from the Episource incident 

 
Strengthening enterprise cyber defense: Enhancing ITDR with SIEM and IAM 

Tech central

Strengthening enterprise cyber defense: Enhancing ITDR with SIEM and IAM 

 
Securing digital finance ecosystems: Protecting data and transactions in modern payment platforms

BFSI

Securing digital finance ecosystems: Protecting data and transactions in modern payment platforms

 
Comprehensive cybersecurity for smart campuses: Securing email and collaboration tools, computer labs, and shared devices

Education

Comprehensive cybersecurity for smart campuses: Securing email and collaboration tools, computer labs, and shared devices

 
Defending source code security: Preventing cyber attacks on developer workstations 

IT

Defending source code security: Preventing cyber attacks on developer workstations 

 
Enhancing cyber security in banking: SIEM-driven protection for ATMs, kiosks, online banking, and fintech integrations

BFSI

Enhancing cyber security in banking: SIEM-driven protection for ATMs, kiosks, online banking, and fintech integrations

 
In-house vs. outsourced SOCs: Weighing the pros and cons for modern enterprises

Tech central

In-house vs. outsourced SOCs: Weighing the pros and cons for modern enterprises

 
5 critical vulnerabilities and how real-time monitoring strengthens Active Directory security

Tech central

5 critical vulnerabilities and how real-time monitoring strengthens Active Directory security

 
Healthcare

Healthcare

Threats exploiting operational overload in the healthcare system

 
Threatscape

Threatscape

Infiltration of Asian telecom networks: How cyberattackers remained undetected

 
Threatscape

Threatscape

Phishing to persistence: The full lifecycle of Kimsuky’s attack chain

 
Threatscape

Threatscape

Anatomy of a ransomware attack: Critical lessons from the Unimicron incident

 
Threatscape

Threatscape

Digital vendetta: Algerian hackers strike back at Morocco over X breach

 
How SIEM tools power data-driven security decisions for enterprises

Tech central

How SIEM tools power data-driven security decisions for enterprises

 
Remote work security: Protecting data and preventing cyberthreats in a digital workplace

IT

Remote work security: Protecting data and preventing cyberthreats in a digital workplace

 
Leverage this blueprint to ensure the security of your Active Directory

Infographics

Leverage this blueprint to ensure the security of your Active Directory

 
SOC analyst career roadmap - Skills certifications and growth path

Infographics

SOC analyst career roadmap - Skills certifications and growth path

 
The SOC incident response process

Infographics

The SOC incident response process

×