In case 2020 wasn’t dystopian enough, here’s some more unbelievable news. On July 15, 2020, social media giant Twitter admitted it fell victim to a security...
Breach notification requirements of POPIA: The importance of SIEM
A crucial aspect of the Protection of Personal Information Act (POPIA) is the notification of security compromises—unauthorized exposures of personal data—to the authorities and the...
Security operations center, Part 1: The guardian of your organization
Hacking is finding a way to accomplish a goal, never accepting no for an answer, and being more persistent and patient than anyone else. –...
ManageEngine named a 2020 Gartner Peer Insights Customers’ Choice for Security Information and Event Management!
We’re excited to announce that ManageEngine has been recognized as a Customers’ Choice in the 2020 Gartner Peer Insights ‘Voice of the Customer’: Security Information...
How to protect your IT infrastructure from a Maze ransomware attack
Pitney Bowes, a global package delivery giant, has been hit by a second ransomware attack in less than seven months, according to ZDNet. Those responsible...
Embracing a holistic approach to privileged access security [Expert-led webinar]
If there’s one silver lining to the COVID-19 pandemic, it’s that the importance of IT security has clearly been brought to the forefront of business...
Telecommunications giant reveals an Active Directory server breach. What can we learn from it?
We’ve always been vocal about the imminent threat of breaches and propagated the message that irrespective of the size of your business, the industry you’re...
Securing Azure Active Directory from PowerShell abuse
Malware attacks are evolving and once common tactics are becoming a thing of the past. Attack strategies, like using a third-party hacking program or injecting...
Email, security, and breaches
Email-based attacks can take many forms, and are typically deployed by cybercriminals in order to extort ransom or leak sensitive data. Just recently, a banking...