The cyberworld has witnessed and defended against several forms of attacks. Some of the most common ones known to disrupt a network include credential stealing, malware...
Are you listening to your logs? Part 4: Open ports
Did you know that an organization with more open ports is more vulnerable to data breaches? In the first, second, and third parts of the...
Are you listening to your logs? Part 3: High disk usage
In the previous blog of this series, we saw how server crashes can be avoided by detecting low disk space in time using logs. In this...
Are you listening to your logs? Part 2: Low disk space
In the first part of this blog series, we saw how monitoring slow server response times in your network can help detect denial-of-service (DoS) attacks....
Are you listening to your logs? Part 1: Slow server response
Loading… Is there a more uninspiring word to encounter while browsing the internet? When a loading screen occurs, statistics show it takes only three seconds for...
Security operations center, Part 1: The guardian of your organization
Hacking is finding a way to accomplish a goal, never accepting no for an answer, and being more persistent and patient than anyone else. –...
SQL Server, Part 3: Adopting the principle of least privilege
In the previous blog in this series, we discussed authentication and authorization mechanisms, and how configuring them properly can help secure your databases. In this blog, we’ll talk about how data...
Hardening Windows security: How to secure your organization—Part 1
The cybersecurity threat landscape is quickly changing. Administrators have become more cautious when it comes to security and governing access, end users have become tech-savvy...
ManageEngine named in Gartner’s Magic Quadrant for Security Information and Event Management four years running!
The cybersecurity market is ever-changing and primarily driven by sophisticated cyberattacks, disruptive technological growth, and stringent data protection regulations like the GDPR and CCPA. We...