Breaches at OnePlus and National Stores reinforce the importance of PCI compliance 

January saw another round of significant credit card data breaches, one of which was the OnePlus breach that compromised the credit card information of around 40,000 customers. The mobile phone manufacturer...

IT Security 2 min read Read

Ransomware attackers and victims fall victim to ransom theft

Recently, there has been a string of attacks affecting some ransomware victims who pay their ransom in an attempt to regain access to their encrypted data. These ransom...

IT Security 2 min read Read

Gartner positions ManageEngine in Magic Quadrant for SIEM, again

Two in a row and much more to go! For the last two years, ManageEngine has been recognized in Gartner’s Magic Quadrant for SIEM and...

IT Security 2 min read Read

Let’s talk about STIX, TAXII, and threat intelligence

In terms of collaboration, Structured Threat Information eXpression (STIX) and Trusted Automated eXchange of Indicator Information (TAXII) represent a revolution in the security industry. These protocols transformed...

EventLogAnalyzer 2 min read Read

How to comply with the GDPR if you’re already ISO 27001-compliant

Most GDPR articles outline the methods you must employ to ensure compliance while collecting personal data from EU citizens. The security requirements for protecting and processing personal data are outlined in the latter part...

IT Security 2 min read Read

Webinar: How to manage access to personal data under the GDPR

One of the GDPR’s most important security requirements is that organizations must deploy technical measures to track who accesses personal data. If your organization is gearing up for the GDPR, be sure to verify that...

IT Security 2 min read Read

How ISO 27001 helps you comply with the GDPR

ISO 27001 is a set of information security best practices designed to help organizations ensure all confidential data and critical resources in their network are secure. It brings three major components together—people,...

IT Security 2 min read Read

Our new privileged identity management suite is now available!

Yes! We just launched our new privileged identity management (PIM) suite, an enterprise-grade, all-inclusive solution that enables IT admins to discover, store, control, and monitor all privileged identities...

IT Security 3 min read Read

How SIEM can help with auditing and compliance

Recent cyber breaches and tighter compliance regulations are pushing businesses to invest more heavily in IT security. You and your organization may very well be in the process of assessing your...

IT Security 2 min read Read