Raisons qui font de la surveillance de la bande passante une priorité absolue

bande passante

Pour suivre le développement de leurs infrastructures hybrides, les entreprises du monde entier mettent en œuvre diverses tactiques pour minimiser les goulots d’étranglement, améliorer la vitesse du réseau et optimiser leur retour sur investissement. Ces approches diffèrent d’une entreprise à

General 7 min read Read

Great Power(Shell) doesn’t always come with great responsibility: Sometimes, SIEM is all you need

Fileless threats are on the rise. These threats occur when cybercriminals use pre-existing software in victims’ systems to carry out attacks, instead of using a malicious attachment or file. More often than not, a criminal’s favorite tool for a fileless …

General 3 min read Read

Safeguard your Active Directory using MITRE ATT&CK techniques

Active Directory (AD) handles sensitive organization data like user credentials, personal information of employees, security permissions, and more. Because of this, AD is prone to being targeted by cyber attackers. Malicious actors are constantly coming up with new attack strategies, …

General 2 min read Read

Are you fishing for tips to thwart phishing scams?

“You’ve inherited a fortune. To transfer the money, I need your bank account credentials.” If you have ever stumbled across something like this, you need to continue reading.

According to Verizon’s 2022 Data Breach Investigations Report, 25% of all …

General 3 min read Read

How to improve the employee experience while ensuring identity security

Employees in the post-lockdown world have bid goodbye to traditional work environments. Remote and hybrid work is the new normal, with employees expecting full access to their work resources even when working remotely. They might also use multiple devices, even …

General 2 min read Read

Password attacks: How to combat them


“Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months.” – Clifford Stoll, Astronomer and engineer

This identity security week, it’s important to understand the importance of passwords in cybersecurity, …

General 3 min read Read

ManageEngine at Black Hat MEA–come join us!

We’re incredibly excited to be taking part in this year’s running of Black Hat MEA, one of the biggest InfoSec events in the world!

This is a period of great transformation for the Kingdom of Saudi Arabia, as it aims …

General 2 min read Read

The ultimate price: The morality of paying your attacker their ransom

“Have you backed up your files?”

If you had a Dirham for every time you heard this and followed up with immediate action, you’d be a Shiekh by now. But alas, we’re here because you didn’t do your due diligence …

General 4 min read Read