Security operations center, Part 1: The guardian of your organization

Hacking is finding a way to accomplish a goal, never accepting no for an answer, and being more persistent and patient than anyone else. – Paul Asadoorian, founder and CTO, Security Weekly.

Hackers arm themselves with the latest technologies, employ …

IT Security 3 min read Read

ManageEngine named a 2020 Gartner Peer Insights Customers’ Choice for Security Information and Event Management!

We’re excited to announce that ManageEngine has been recognized as a Customers’ Choice in the 2020 Gartner Peer Insights ‘Voice of the Customer’: Security Information and Event Management (SIEM) for the second time. This is in addition to our recognition …

IT Security 2 min read Read

How to protect your IT infrastructure from a Maze ransomware attack

Pitney Bowes, a global package delivery giant, has been hit by a second ransomware attack in less than seven months, according to ZDNet. Those responsible for the attack have released screenshots portraying directory listings from inside the company’s …

IT Security 3 min read Read

Embracing a holistic approach to privileged access security [Expert-led webinar]

If there’s one silver lining to the COVID-19 pandemic, it’s that the importance of IT security has clearly been brought to the forefront of business discussions. Almost every industry now recognizes the need to enforce security in its day-to-day …

IT Security 1 min read Read

Telecommunications giant reveals an Active Directory server breach. What can we learn from it?

We’ve always been vocal about the imminent threat of breaches and propagated the message that irrespective of the size of your business, the industry you’re in, or your geography, you can be subject to a security breach. And unfortunately, history …

IT Security 5 min read Read

Securing Azure Active Directory from PowerShell abuse

Malware attacks are evolving and once common tactics are becoming a thing of the past. Attack strategies, like using a third-party hacking program or injecting viruses from external sources, are almost obsolete as they leave a distinct footprint. Most antimalware …

IT Security 4 min read Read

Email, security, and breaches

Email-based attacks can take many forms, and are typically deployed by cybercriminals in order to extort ransom or leak sensitive data. Just recently, a banking Trojan named Trickbot targeted Italy, a hotspot for COVID-19 cases, with email spam campaigns. While …

IT Security 3 min read Read

SQL Server, Part 3: Adopting the principle of least privilege

In the previous blog in this series, we discussed authentication and authorization mechanisms, and how configuring them properly can help secure your databases. In this blog, we’ll talk about how data breaches can be prevented by implementing the principle of …

IT Security 3 min read Read

Hardening Windows security: How to secure your organization—Part 3

This is the final blog of our three-part blog series on living-off-the-land (LOTL) attacks. If you missed last week’s blog, you can read it here.

 LOTL attacks are also known as “malware-free” attacks because your own tools are used …

IT Security 2 min read Read