Cybersecurity Expert Talks

  • Cybersecurity in financial services
    UEBA Jul 04, 2024 7 min

    Cybersecurity in financial services

    The financial services industry is under constant threat of cybercrime. Due to the sensitive nature of the data handled, the financial implications of security breaches, and the need to maintain customer trust and regulatory compliance, it's crucial for the banking, financial services, and insurance (BFSI) sector to strengthen its cybersecurity posture.

    Read more 
  • Cybersecurity in manufacturing
    UEBA Jul 04, 2024 6 min

    Cybersecurity in manufacturing

    Cyberattacks against the manufacturing industry are increasing, as evidenced by the 15% increase in attacks in the third quarter of 2023 as compared to 2022. Being in the midst of Industry 4.0, the fourth industrial revolution, there's a growing prevalence of high speed internet connectivity, the cloud, industrial internet of things (IIoT) devices, smart sensors, and other technological advances.

    Read more 
  • Data security in healthcare with UEBA
    UEBA Jun 27, 2024 7 min

    Data security in healthcare with UEBA

    Data security in healthcare is of immense importance due to the sensitive nature of the data involved and the increasing frequency of cyberattacks targeting the healthcare industry. Healthcare organizations hold vast amounts of protected health information (PHI)

    Read more 
  • The strategic importance of SIEM in cybersecurity
    SIEM Feb 26, 2024 6 min

    The strategic importance of SIEM in cybersecurity

    Forget fortune tellers, the future of cybersecurity is staring right at us in the form of security information and event management (SIEM) platforms. SIEM is no longer just a tech buzzword; these systems are becoming indispensable tools for businesses of all sizes.

    Read more 
  • How cron jobs can be con jobs
    SIEM Feb 16, 2024 7 min

    How cron jobs can be con jobs

    Routines like data backups, cache clearing, and other tasks can easily be managed with task automation tools. Task schedulers, cron jobs, and similar automation utilities help administrators achieve just that. Once these automations are scheduled, an array of administrative tasks are executed without missing a beat.

    Read more 

Featured Articles

  • phishing-malware-valentines-day-2022
    SIEM Nov 08, 2023 6 min

    Cyber detective: Hunting for threats in the digital wilderness

    Read more 
  • 5 cognitive biases that affect your cybersecurity decisions
    SIEM Jun 28, 2022 6 min

    5 cognitive biases that affect your cybersecurity decisions

    Read more 
  • Calculating the cost savings of a SIEM solution
    SIEM Nov 04, 2022 6 min

    Calculating the cost savings of a SIEM solution

    Read more 
  • Cyber swachh Bharat: Cybersecurity policies over the last 76 years in India
    SIEM Aug 14, 2023 6 min

    Cyber swachh Bharat: Cybersecurity policies over the last 76 years in India

    Read more 

New Posts

  • SIEM 6 min

    10 cybersecurity misconfigurations your SOC team must be wary about

     
  • Securing your Active Directory against chaos

     
  • SIEM 6 min

    Is your organization HIPAA compliant? Calculate your HIPAA compliance score to find out

     

About Expert Talks

Organizations nowadays need to upgrade their threat detection and response capabilities. Lack of experience and knowledge about the current cybersecurity landscape can cost you millions of dollars. But with a strong security strategy, it's definitely possible to prevent that from happening.

ManageEngine Expert Talks is here just to do that.

We deliver content that help you devise the best cybersecurity strategies to help you think ahead of any possible attacks.

Looks interesting?

Subscribe to the best source of information on cybersecurity.

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  •  
  •  
    By clicking on Keep me Updated you agree to processing of personal data according to the Privacy Policy.

SIEM

See all
  • The strategic importance of SIEM in cybersecurity
    SIEM Feb 26, 2024 6 min

    The strategic importance of SIEM in cybersecurity

    Forget fortune tellers, the future of cybersecurity is staring right at us in the form of security information and event management

    Read more 
  • How cron jobs can be con jobs
    SIEM Feb 16, 2024 7 min

    How cron jobs can be con jobs

    Routines like data backups, cache clearing, and other tasks can easily be managed with task automation tools. Task schedulers, cron jobs, and similar

    Read more 
  • 10 cybersecurity misconfigurations your SOC team must be wary about
    SIEM Feb 02, 2024 6 min

    10 cybersecurity misconfigurations your SOC team must be wary about

    Have you ever heard of the 80/20 rule? The 80/20 rule, also known as the Pareto Principle, was put forth by the Italian economist,

    Read more 

Attack detection

See all
  • Securing your Active Directory against chaos
    Attack detection Jan 30, 2024 8 min

    Securing your Active Directory against chaos

    Have you come across chaos theory? Chaos theory, summarized by Edward Lorenz,

    Read more 
  • Common indicators of compromise every SOC team should watch out for
    Attack detection Jan 23, 2024 8 min

    Common indicators of compromise every SOC team should watch out for

    Forensics are an integral part of discovering how a cybercrime took place.

    Read more 
  • The shell game: A deep dive into detecting PowerShell attacks—Part 3
    Attack detection Dec 14, 2023 8 min

    The shell game: A deep dive into detecting PowerShell attacks—Part 3

    Have you ever seen a shell game being played? Nobody but the swindler

    Read more 

Cloud Security

See all
  • The high price of careless cloud app usage
    Cloud Security May 11, 2022 4 min

    The high price of careless cloud app usage

    If you believe internal attacks are caused only by malicious insiders, think again. According to a Ponemon Institute report from 2022, employee...

    Read more 
  • CASBs for multi-cloud
    Cloud Security Apr `5, 2022 4 min

    CASBs for multi-cloud

    Security is a big issue IT teams face when it comes to multi-cloud management. A cloud access security broker (CASB) provides organizations with a much-needed opportunity...

    Read more 
  • Shedding light on shadow IT and data exfiltration with CASB
    Cloud Security Feb 10, 2022 5 min

    Shedding light on shadow IT and data exfiltration with CASB

    The days when employees and assets functioned only within the company network are long gone. Now, all that is required is a username and password...

    Read more 

Data Security

See all
  • Are you prepared to protect your organization's AI against data poisoning?
    Data Security Dec 18, 2023 6 min

    Attack surface expansion: A closer look

    In the cybersecurity landscape, attack surface expansion isn't a new concept. Organizations with a digital presence..

    Read more 
  • Anticipating the future: Top 10 cybersecurity trends for 2024
    Data Security Dec 08, 2023 5 min

    Anticipating the future: Top 10 cybersecurity trends for 2024

    It's time to discuss the various trends forecast to shape cybersecurity in the next 365 days. Tech developments like generative AI

    Read more 
  • Maintaining mental well-being: The key to sustainable cybersecurity success
    Data Security Nov 08, 2023 5 min

    Maintaining mental well-being: The key to sustainable cybersecurity success

    For many years, security analysts have consistently prioritized..

    Read more 

UEBA

See all
  • Cybersecurity in financial services
    UEBA Jul 04, 2024 7 min

    Cybersecurity in financial services

    The financial services industry is under constant threat of cybercrime. Due to the sensitive nature of the data handled, the financial implications of security breaches,

    Read more 
  • Cybersecurity in manufacturin
    UEBA Jul 04, 2024 6 min

    Cybersecurity in manufacturing

    Cyberattacks against the manufacturing industry are increasing, as evidenced by the 15% increase in attacks in the third quarter of 2023 as compared to 2022.

    Read more 
  • The importance of anomaly modeling when discerning user behavior
    UEBA June 27, 2024 7 min

    Data security in healthcare with UEBA

    Data security in healthcare is of immense importance due to the sensitive nature of the data involved and the increasing frequency of cyberattacks targeting the healthcare industry.

    Read more 

Threats in three minutes

See all
  •  

    Conti ransomware

    Conti is a ransomware-as-a-service affiliate program associated with Russian threat actors. The developers of this ransomware sell or lease their ransomware technology...

    Play now
     
  •  

    Apache Log4j vulnerability

    Logging is a fundamental feature of software. A flaw in Log4j, a Java-based logging utility, has been deemed as one of the most high-profile security risks...

    Play now
     
  •  

    US government probes VPN hack within federal agencies

    On April 29, 2022, the United States government investigated a hack against federal agencies...

    Play now
     

Get the latest content delivered
right to your inbox!

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  •  
  •  
    By clicking on Keep me Updated you agree to processing of personal data according to the Privacy Policy.

EXPERT TALKS

     
     

2021 Zoho Corporation Pvt. Ltd. All rights reserved.