The 5 essential components of successful file server auditing

File server auditing is an essential process, and inattention can cost your organization heavily, both in terms of business impact, and governmental financial penalties.

Imagine this scenario: A professor at a university unscrupulously accesses several critical files that contain breakthrough …

Log360 2 min read Read

Business Intelligence Group’s 2020 Fortress Cyber Security Award for Threat Detection goes to…

We are excited to share that ManageEngine’s Log360 has been awarded the 2020 Fortress Cyber Security Award for Threat Detection. The Business Intelligence Group’s unique scoring system measures performance across multiple business domains. 

With threats on the rise, cybersecurity …

Log360 1 min read Read

How to protect your IT infrastructure from a Maze ransomware attack

Pitney Bowes, a global package delivery giant, has been hit by a second ransomware attack in less than seven months, according to ZDNet. Those responsible for the attack have released screenshots portraying directory listings from inside the company’s …

Log360 3 min read Read

The Monopoly Man takes on privacy, data breaches, and more [Podcast series]

Monopoly Man, ManageEngine podcast

In the second and final episode of our Expert Tech Talk podcast series, Ian Madrigal, known as the Monopoly Man, and Sid, IT security expert at ManageEngine, get into a detailed discussion on various regulatory mandates; the potential consequences …

Log360 2 min read Read

The Monopoly Man features in our first-ever Expert Tech Talk podcast series. Listen now!

Monopoly Man, Monopoly Man podcast

We are pleased to launch our first-ever Expert Tech Talk podcast series featuring renowned privacy expert Ian Madrigal, popularly known as the Monopoly Man. Ian, who has championed the cause of data privacy in addition to various other initiatives, …

Log360 2 min read Read

SQL Server, Part 1: Why you should monitor SQL logs

 

Over 44 records are stolen per second every day due to data breaches, and according to the Risk Based Security Research report published in 2019, databases are the top most targeted assets for malicious actors to exploit organizations’ confidential data. …

Log360 2 min read Read

Why log archival is important for network security

Network devices like workstations, servers, routers, and firewalls generate a large volume of logs every day. These digital bread crumbs can be your greatest ally in network security; following them could point you towards potential data breaches and network vulnerabilities. …

Log360 2 min read Read

Securing IT in healthcare organizations: All you need to know

From maintaining electronic health records and generating medical reports, to carrying out robot-assisted surgeries and setting up online doctor-patient communication portals, the healthcare industry is becoming increasingly reliant on technology to effectively carry out day-to-day operations. While incorporating advanced technology …

Log360 2 min read Read