Are you listening to your logs? Part 4: Open ports

Did you know that an organization with more open ports is more vulnerable to data breaches?

 In the first, second, and third parts of the Are you listening to your logs? series, we saw how logs can be …

IT Security 3 min read Read

Are you listening to your logs? Part 3: High disk usage

In the previous blog of this series, we saw how server crashes can be avoided by detecting low disk space in time using logs. In this blog, we’ll talk about another server metric, disk usage, and how it can be …

IT Security 2 min read Read

Are you listening to your logs? Part 2: Low disk space

In the first part of this blog series, we saw how monitoring slow server response times in your network can help detect denial-of-service (DoS) attacks. In this blog, we look at how logs can detect an operational issue such as …

IT Security 2 min read Read

Are you listening to your logs? Part 1: Slow server response

Loading…

Is there a more uninspiring word to encounter while browsing the internet? When a loading screen occurs, statistics show it takes only three seconds for a potential customer to leave your website.

Are you listening to your logs? is …

IT Security 2 min read Read

Security operations center, Part 1: The guardian of your organization

Hacking is finding a way to accomplish a goal, never accepting no for an answer, and being more persistent and patient than anyone else. – Paul Asadoorian, founder and CTO, Security Weekly.

Hackers arm themselves with the latest technologies, employ …

IT Security 3 min read Read

SQL Server, Part 3: Adopting the principle of least privilege

In the previous blog in this series, we discussed authentication and authorization mechanisms, and how configuring them properly can help secure your databases. In this blog, we’ll talk about how data breaches can be prevented by implementing the principle of …

IT Security 3 min read Read

Hardening Windows security: How to secure your organization—Part 1

The cybersecurity threat landscape is quickly changing. Administrators have become more cautious when it comes to security and governing access, end users have become tech-savvy and security-aware, and attackers have also raised their game.

 Living-off-the-land attacks, or LOTL, is one …

IT Security 2 min read Read

ManageEngine named in Gartner’s Magic Quadrant for Security Information and Event Management four years running!

The cybersecurity market is ever-changing and primarily driven by sophisticated cyberattacks, disruptive technological growth, and stringent data protection regulations like the GDPR and CCPA. We are constantly evolving our solutions to meet these dynamic market needs. We believe our recognition …

IT Security 2 min read Read

Five events you should be alerted about in your network

“What types of events in my network are indications of an attack?” This is a question many IT security experts find themselves wondering, often because there isn’t one definitive answer.

Configuring alerts for every type of event isn’t an option. …

IT Security 1 min read Read