In our previous blog, Data in use and why you need to keep an eye on file activities, we discussed why you should monitor how...
The states of data, Part 3: Data in use and why you need to keep an eye on file activities
In our previous blog, The states of data, Part 2: Why visibility is key for protecting data at rest, we discussed the importance of discovering...
The states of data, Part 2: Why visibility is key for protecting data at rest
In part two of our blog series, The states of data, we’ll be discussing the various threats to sensitive data at rest in the form...
ManageEngine named as a Challenger again in the 2024 Gartner® Magic Quadrant™ for Privileged Access Management
We are elated to announce that ManageEngine has again been recognized as a Challenger in the 2024 Gartner® Magic Quadrant™ for Privileged Access Management. We...
Cybersecurity forecast: Top CIOs reveal their biggest fears and plans
Did you know that 79% of top CIOs believe AI-driven cyberattacks will be the most challenging threat in the next five years? As organizations prepare...
Top tips: Camfecting—Protect yourself from prying eyes
Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week,...
Tech tales and endpoint hacks: Dive deep with Endpoint Pulse
Remember the captivating stories you heard growing up? Though we may have graduated to books and then podcasts, the power of storytelling remains. There’s something...
Evaluating the differences: What businesses should know about PCI DSS v4.0 versus v3.2.1
In the realm of payment security, the Payment Card Industry Data Security Standard (PCI DSS) provides a critical framework that guides businesses to protect cardholder information...
Understanding the Okta supply chain attack of 2023: A comprehensive analysis
In October 2023, Okta, a leading provider of identity and access management (IAM) solutions, experienced a data breach affecting its customer support system. This incident...