IT Security

Visit:

Log management and SIEM fundamentals: Comprehensive log collection and auditing

The first step in SIEM is collecting log data. Log data, as we saw in part 1, is what drives any SIEM solution. A SIEM solution should be able to process, in real time, large

IT Security 3 min read

Brace yourself. GDPR is on the way.

Are you ready for May 25th, 2018?

A little less than a year from now, the European Union will implement the General Data Protection Regulation (GDPR) on May 25th, 2018. This regulation outlines how organizations — both commercial

IT Security 3 min read

When love is in the air, cyber-criminals are on the prowl

Valentine’s Day cyber-attacks could well be the beginning of an APT for enterprises!

It is that time of the year again. Cupid comes out to play with his arrows, love is in the air, pink takes over everything, roses are …

IT Security 3 min read

5 Top Targets for Today’s Hackers

Black Hat USA bills itself as “the show that sets the benchmark for all other security conferences.” While most conferences tend to over-promote themselves, given the activity at this year’s show, that actually might be something of an understatement.

From …

ADAudit Plus , ADManager , EventLogAnalyzer , General , IT Security , ManageEngine , Password Manager Pro 3 min read

Spate of shocking cyber attacks on universities jolt academia

It is hauntingly clear – cyber criminals have set their eyes firmly on universities, research institutions, and centers of higher learning in the United States and other parts of the world. If the cyber attacks of the past few weeks …

DeviceExpert , EventLogAnalyzer , Firewall Analyzer , General , IT Security , ManageEngine , Password Manager Pro 2 min read