Watch out for tenants living off your land

The cyberworld has witnessed and defended against several forms of attacks. Some of the most common ones known to disrupt a network include credential stealing, malware...

IT Security 3 min read Read

Are you listening to your logs? Part 4: Open ports

Did you know that an organization with more open ports is more vulnerable to data breaches?  In the first, second, and third parts of the...

IT Security 3 min read Read

Are you listening to your logs? Part 3: High disk usage

In the previous blog of this series, we saw how server crashes can be avoided by detecting low disk space in time using logs. In this...

IT Security 2 min read Read

Are you listening to your logs? Part 2: Low disk space

In the first part of this blog series, we saw how monitoring slow server response times in your network can help detect denial-of-service (DoS) attacks....

IT Security 2 min read Read

Are you listening to your logs? Part 1: Slow server response

Loading… Is there a more uninspiring word to encounter while browsing the internet? When a loading screen occurs, statistics show it takes only three seconds for...

IT Security 2 min read Read

Security operations center, Part 1: The guardian of your organization

Hacking is finding a way to accomplish a goal, never accepting no for an answer, and being more persistent and patient than anyone else. –...

IT Security 3 min read Read

SQL Server, Part 3: Adopting the principle of least privilege

In the previous blog in this series, we discussed authentication and authorization mechanisms, and how configuring them properly can help secure your databases. In this blog, we’ll talk about how data...

IT Security 3 min read Read

Hardening Windows security: How to secure your organization—Part 1

The cybersecurity threat landscape is quickly changing. Administrators have become more cautious when it comes to security and governing access, end users have become tech-savvy...

IT Security 2 min read Read

ManageEngine named in Gartner’s Magic Quadrant for Security Information and Event Management four years running!

The cybersecurity market is ever-changing and primarily driven by sophisticated cyberattacks, disruptive technological growth, and stringent data protection regulations like the GDPR and CCPA. We...

IT Security 2 min read Read