In the previous blog of this series, we saw how server crashes can be avoided by detecting low disk space in time using logs. In this blog, we’ll talk about another server metric, disk usage, and how it can be …
Are you listening to your logs? Part 2: Low disk space
In the first part of this blog series, we saw how monitoring slow server response times in your network can help detect denial-of-service (DoS) attacks. In this blog, we look at how logs can detect an operational issue such as …
Are you listening to your logs? Part 1: Slow server response
Loading…
Is there a more uninspiring word to encounter while browsing the internet? When a loading screen occurs, statistics show it takes only three seconds for a potential customer to leave your website.
Are you listening to your logs? is …
Breach notification requirements of POPIA: The importance of SIEM
A crucial aspect of the Protection of Personal Information Act (POPIA) is the notification of security compromises—unauthorized exposures of personal data—to the authorities and the data subjects in concern. Notification of data breaches is mandated by several data protection …

Security operations center, Part 1: The guardian of your organization
Hacking is finding a way to accomplish a goal, never accepting no for an answer, and being more persistent and patient than anyone else. – Paul Asadoorian, founder and CTO, Security Weekly.
Hackers arm themselves with the latest technologies, employ …

ManageEngine named a 2020 Gartner Peer Insights Customers’ Choice for Security Information and Event Management!
We’re excited to announce that ManageEngine has been recognized as a Customers’ Choice in the 2020 Gartner Peer Insights ‘Voice of the Customer’: Security Information and Event Management (SIEM) for the second time. This is in addition to our recognition …

How to protect your IT infrastructure from a Maze ransomware attack
Pitney Bowes, a global package delivery giant, has been hit by a second ransomware attack in less than seven months, according to ZDNet. Those responsible for the attack have released screenshots portraying directory listings from inside the company’s …