A reminder to focus on securing your databases and web servers 

The trend of global cyberattacks has continued into February. In California, The Sacramento Bee recently experienced a ransomware attack on its databases, exposing the voter registration details...

IT Security 2 min read Read

How to prioritize your top security alerts for better SIEM

Receiving alerts when a critical event occurs is the first step in responding to a security incident. But as any security expert knows, analyzing log data can get chaotic when you...

IT Security 1 min read Read

Breaches at OnePlus and National Stores reinforce the importance of PCI compliance 

January saw another round of significant credit card data breaches, one of which was the OnePlus breach that compromised the credit card information of around 40,000 customers. The mobile phone manufacturer...

IT Security 2 min read Read

Ransomware attackers and victims fall victim to ransom theft

Recently, there has been a string of attacks affecting some ransomware victims who pay their ransom in an attempt to regain access to their encrypted data. These ransom...

IT Security 2 min read Read

Gartner positions ManageEngine in Magic Quadrant for SIEM, again

Two in a row and much more to go! For the last two years, ManageEngine has been recognized in Gartner’s Magic Quadrant for SIEM and...

IT Security 2 min read Read

Let’s talk about STIX, TAXII, and threat intelligence

In terms of collaboration, Structured Threat Information eXpression (STIX) and Trusted Automated eXchange of Indicator Information (TAXII) represent a revolution in the security industry. These protocols transformed...

EventLogAnalyzer 2 min read Read

How to comply with the GDPR if you’re already ISO 27001-compliant

Most GDPR articles outline the methods you must employ to ensure compliance while collecting personal data from EU citizens. The security requirements for protecting and processing personal data are outlined in the latter part...

IT Security 2 min read Read

Webinar: How to manage access to personal data under the GDPR

One of the GDPR’s most important security requirements is that organizations must deploy technical measures to track who accesses personal data. If your organization is gearing up for the GDPR, be sure to verify that...

IT Security 2 min read Read

How ISO 27001 helps you comply with the GDPR

ISO 27001 is a set of information security best practices designed to help organizations ensure all confidential data and critical resources in their network are secure. It brings three major components together—people,...

IT Security 2 min read Read