The Monopoly Man takes on privacy, data breaches, and more [Podcast series]

Monopoly Man, ManageEngine podcast

In the second and final episode of our Expert Tech Talk podcast series, Ian Madrigal, known as the Monopoly Man, and Sid, IT security expert at ManageEngine, get into a detailed discussion on various regulatory mandates; the potential consequences …

Log360 2 min read Read

The Monopoly Man features in our first-ever Expert Tech Talk podcast series. Listen now!

Monopoly Man, Monopoly Man podcast

We are pleased to launch our first-ever Expert Tech Talk podcast series featuring renowned privacy expert Ian Madrigal, popularly known as the Monopoly Man. Ian, who has championed the cause of data privacy in addition to various other initiatives, …

Log360 2 min read Read

SQL Server, Part 1: Why you should monitor SQL logs


Over 44 records are stolen per second every day due to data breaches, and according to the Risk Based Security Research report published in 2019, databases are the top most targeted assets for malicious actors to exploit organizations’ confidential data. …

Log360 2 min read Read

The Windows LDAP bind security vulnerability you should know about

The Lightweight Directory Access Protocol (LDAP) is used by directory clients to access data held by directory servers. Clients and applications authenticate with Windows Active Directory (AD) using LDAP bind operations.

There are different kinds of LDAP bind operations, including:…

ADAudit Plus 2 min read Read

Why log archival is important for network security

Network devices like workstations, servers, routers, and firewalls generate a large volume of logs every day. These digital bread crumbs can be your greatest ally in network security; following them could point you towards potential data breaches and network vulnerabilities. …

Log360 2 min read Read

Opening up our end-user password management tool to help businesses operate seamlessly while workforces are remote

Register here to avail the 60-day license for ADSelfService Plus.

COVID-19 has been declared a pandemic by the World Health Organization (WHO). As a precautionary measure for the safety of employees, most organizations are adopting mandatory work from home policy.…

ADSelfService Plus 1 min read Read

All you need to know about NIST password guidelines

The National Institute of Standards and Technology (NIST), a physical sciences laboratory and a non-regulatory agency of the United States Department of Commerce, recently released their guidelines for password security. Some of them are contrary to what we’ve come …

ADSelfService Plus 2 min read Read

Securing IT in healthcare organizations: All you need to know

From maintaining electronic health records and generating medical reports, to carrying out robot-assisted surgeries and setting up online doctor-patient communication portals, the healthcare industry is becoming increasingly reliant on technology to effectively carry out day-to-day operations. While incorporating advanced technology …

Log360 2 min read Read

Users and passwords: Their behavior, your responsibility

A team of researchers studied a group of users of different age groups, gender, and fields of work/study to see their behavioral patterns while handling passwords. The study involved an online survey and an experiment where users were asked to …

ADSelfService Plus 1 min read Read