Hardening Windows security: How to secure your organization—Part 3

This is the final blog of our three-part blog series on living-off-the-land (LOTL) attacks. If you missed last week’s blog, you can read it here.  LOTL attacks are...

IT Security 2 min read Read

Breaking down the San Francisco airport hack

On April 7, 2020, the San Francisco International Airport (SFO) released a notice confirming that two of its websites, SFOConnect.com and SFOConstruction.com, were targets of a cyberattack in March 2020. The attack...

IT Security 2 min read Read

Hardening Windows security: How to secure your organization—Part 2

We’re back with part two of our three-part blog series on living-off-the-land attacks. If you missed part one, you can read it here. In a nutshell, living-off-the-land (LOTL) refers to a type of attack where...

IT Security 2 min read Read

Cybersecurity challenges of the work-from-home model

Just recently, the World Health Organization declared coronavirus a global pandemic. This decision brought with it several health and safety measures, and normal life came to a...

IT Security 3 min read Read

Hardening Windows security: How to secure your organization—Part 1

The cybersecurity threat landscape is quickly changing. Administrators have become more cautious when it comes to security and governing access, end users have become tech-savvy...

IT Security 2 min read Read

IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck]

The definition of an “attack” is changing. The level of complexity and technical expertise needed to perform an attack has been simplified because the features that are...

IT Security 2 min read Read

The rise in cyberattacks surrounding the COVID-19 pandemic

Fear, uncertainty, and doubt are powerful emotions, and time and again, hackers attempt to leverage these for their own gain. As the coronavirus develops into...

IT Security 3 min read Read

ManageEngine named in Gartner’s Magic Quadrant for Security Information and Event Management four years running!

The cybersecurity market is ever-changing and primarily driven by sophisticated cyberattacks, disruptive technological growth, and stringent data protection regulations like the GDPR and CCPA. We...

IT Security 2 min read Read

The US National Security Agency’s best practices for securing your cloud environment

Cloud technology has seen massive advances in recent years, and it’s only getting more complex. With such rapid growth, it can be challenging to keep up. As there’s no one-size-fits-all method to cloud adoption,...

CloudSecurity Plus 1 min read Read