“You’ve inherited a fortune. To transfer the money, I need your bank account credentials.” If you have ever stumbled across something like this, you need...
How to improve the employee experience while ensuring identity security
Employees in the post-lockdown world have bid goodbye to traditional work environments. Remote and hybrid work is the new normal, with employees expecting full access...
How not to become a corporate account takeover victim 101
Account takeover is an attack where cybercriminals take ownership of user accounts using stolen credentials. It is essentially an identity theft fraud where the hacker,...
Password attacks: How to combat them
“Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months.” – Clifford Stoll, Astronomer and...
ManageEngine at Black Hat MEA–come join us!
We’re incredibly excited to be taking part in this year’s running of Black Hat MEA, one of the biggest InfoSec events in the world! This...
The ultimate price: The morality of paying your attacker their ransom
“Have you backed up your files?” If you had a Dirham for every time you heard this and followed up with immediate action, you’d be...
[Expo alert] Visit ManageEngine at VMware Explore 2022 to learn how to easily manage your VMs
It’s already that time of year! VMware is hosting VMware Explore 2022, a global conference on multi-cloud technologies that was previously known as VMworld. ManageEngine...
Minimizing network downtime by integrating network monitoring solutions with ITSM tools
Being a network admin of an enterprise network, you know better than anyone how disastrous network downtimes might be. The cost of downtime study conducted...
The recovery: How to overcome a malware attack
A report published by Cybersecurity Ventures predicts that by 2031, ransomware will attack a business, individual, or device every two seconds. The consequences of such an attack extend beyond the...