What is a Secure Socket Layer (SSL)? How does it ensure safe connection?

Imagine all your online activity being put out in the open—as private as a billboard in Times Square. Before SSL, your private internet information was vulnerable...

General , Log360 3 min read Read

Active Directory security: Exploiting certificate services

Active Directory (AD) is crucial for an organization’s identity and access management strategy, but its complex architecture is also a prime zone for overlooked vulnerabilities....

AD360 2 min read Read

Microsoft Word’s recent glitch deleted documents when saving them

Have your users spent hours working on a document in Microsoft Word, only to have it disappear when they try to save it? A recent...

Active Directory , RecoveryManager Plus 2 min read Read

ManageEngine recognized in the 2024 Gartner® Market Guide for Identity Governance and Administration

We’re proud to announce that ManageEngine has been recognized as a Representative Vendor in Gartner® 2024 Market Guide for Identity Governance and Administration! We believe...

AD360 , General 3 min read Read

The states of data, Part 3: Data in use and why you need to keep an eye on file activities

In our previous blog, The states of data, Part 2: Why visibility is key for protecting data at rest, we discussed the importance of discovering...

DataSecurity Plus , DataSecurity Plus 4 min read Read

The role dark web monitoring plays in regulatory compliance

The digital age has transformed industries, but with it comes a complex web of regulations designed to protect consumers and businesses. From financial services to...

Log360 3 min read Read

Why Microsoft is mandating MFA for Microsoft Entra ID and Azure

Starting on Oct. 15, 2024, Microsoft Entra ID, Microsoft Intune, and other Microsoft Azure applications will require users to sign in with Microsoft Entra MFA....

M365 Manager Plus 5 min read Read

Why educational institutions need robust cybersecurity solutions

Technology has been an integral part of the education industry, even before the onset of the pandemic. However, the shift from traditional classrooms to online...

Active Directory , ADManager Plus 3 min read Read

Top 10 cybersecurity misconfigurations and how to avoid them

Have you ever heard of the 80/20 rule? The 80/20 rule, also known as the Pareto principle, was named after the Italian economist Vilfredo Pareto....

Log360 5 min read Read