Microsoft Patch Tuesday August 2019: WannaCry-level “wormable” flaws patched

No matter how prepared you are, Patch Tuesday never fails to throw in a surprise. With the Microsoft Security Response Center’s warning note, “August 2019 Security Update includes...

General 3 min read Read

Five worthy reads: Threat intelligence—the key to proactive cybersecurity

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore how cyber...

ManageEngine 2 min read Read

Five worthy reads: Is your enterprise dealing with data sprawl properly?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we define what data...

General 3 min read Read

Five worthy reads: Educating the education sector on cybersecurity

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss the state of...

ManageEngine 2 min read Read

Top three reasons passwords are here to stay as the primary form of authentication

Yahoo and cell phone companies like Samsung wanted to kill passwords in 2005 and 2014 respectively, yet in 2019 most of us are still logging on...

General 2 min read Read

The why and how of browser security

The internet has reshaped the workplace, and internet browsers have become an indispensible tool for today’s workforce. Browsers have also become the weak link that...

General 3 min read Read

Five worthy reads: Should NoOps be your new operations strategy?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss whether NoOps...

General 3 min read Read

Boost your organization’s productivity with these 5 password management techniques

For some time now, many organizations have claimed they’d go password-less. Even tech giants like Google and Microsoft want to kill passwords. Yet, almost two decades later, passwords remain the primary form of authentication in Gmail,...

General 2 min read Read

Five worthy reads: Fend off cyberattacks using dark web intelligence

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss how organizations...

ManageEngine 3 min read Read