The ultimate price: The morality of paying your attacker their ransom

“Have you backed up your files?” If you had a Dirham for every time you heard this and followed up with immediate action, you’d be...

General 4 min read Read

[Expo alert] Visit ManageEngine at VMware Explore 2022 to learn how to easily manage your VMs

It’s already that time of year! VMware is hosting VMware Explore 2022, a global conference on multi-cloud technologies that was previously known as VMworld. ManageEngine...

General 1 min read Read

Celebrating the power of the internet

International Internet Day (10/29) is an occasion for people to celebrate the great invention that transformed the way we live, work, and communicate. The day...

General 3 min read Read

Minimizing network downtime by integrating network monitoring solutions with ITSM tools

Being a network admin of an enterprise network, you know better than anyone how disastrous network downtimes might be. The cost of downtime study conducted...

General 3 min read Read

The recovery: How to overcome a malware attack

A report published by Cybersecurity Ventures predicts that by 2031, ransomware will attack a business, individual, or device every two seconds. The consequences of such an attack extend beyond the...

General 3 min read Read

Halloween or ITOps: Which is scarier?

Each year on Halloween, it is said that souls of the dead return. So we dress up in costumes, carve jack-o-lanterns, and light bonfires to ward...

General 1 min read Read

ManageEngine recognized in the Gartner® Magic Quadrant™ for Security Information and Event Management for the sixth time!

Today, we’re excited to announce that ManageEngine has been recognized in the 2022 Gartner Magic Quadrant for Security Information and Event Management (SIEM), appearing in...

General 3 min read Read

How important is cryptography in network security?

“Please enter the one-time-password (OTP) that has been sent to your registered mobile number.” The next time you see a statement like this remember that...

General 3 min read Read

Five worthy reads: Who let the stranger in? Video conferencing attacks

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about...

General 2 min read Read