Register here to receive a free, 60-day license for AD360 One of the primary concerns of IT admins when employees start working remotely is authenticating users. How can employees securely log in...
The Monopoly Man takes on privacy, data breaches, and more [Podcast series]
In the second and final episode of our Expert Tech Talk podcast series, Ian Madrigal, known as the Monopoly Man, and Sid, IT security expert at ManageEngine, get into a detailed discussion on...
The Monopoly Man features in our first-ever Expert Tech Talk podcast series. Listen now!
We are pleased to launch our first-ever Expert Tech Talk podcast series featuring renowned privacy expert Ian Madrigal, popularly known as the Monopoly Man. Ian, who has championed the cause of...
SQL Server, Part 1: Why you should monitor SQL logs
Over 44 records are stolen per second every day due to data breaches, and according to the Risk Based Security Research report published in 2019, databases are the...
Why log archival is important for network security
Network devices like workstations, servers, routers, and firewalls generate a large volume of logs every day. These digital bread crumbs can be your greatest ally...
Opening up our end-user password management tool to help businesses operate seamlessly while workforces are remote
Register here to avail the 60-day license for ADSelfService Plus. COVID-19 has been declared a pandemic by the World Health Organization (WHO). As a precautionary...
All you need to know about NIST password guidelines
The National Institute of Standards and Technology (NIST), a physical sciences laboratory and a non-regulatory agency of the United States Department of Commerce, recently released their guidelines...
Securing IT in healthcare organizations: All you need to know
From maintaining electronic health records and generating medical reports, to carrying out robot-assisted surgeries and setting up online doctor-patient communication portals, the healthcare industry is becoming increasingly reliant on technology to effectively carry out...
Users and passwords: Their behavior, your responsibility
A team of researchers studied a group of users of different age groups, gender, and fields of work/study to see their behavioral patterns while handling passwords. The...