Tech tales and endpoint hacks: Dive deep with Endpoint Pulse

Remember the captivating stories you heard growing up? Though we may have graduated to books and then podcasts, the power of storytelling remains. There’s something...

Customer Story , Desktop & Mobile , Endpoint Central , General , IT Security , ManageEngine , ManageEngine UEM 2 min read Read

Evaluating the differences: What businesses should know about PCI DSS v4.0 versus v3.2.1

In the realm of payment security, the Payment Card Industry Data Security Standard (PCI DSS) provides a critical framework that guides businesses to protect cardholder information...

IT Security 3 min read Read

Understanding the Okta supply chain attack of 2023: A comprehensive analysis

In October 2023, Okta, a leading provider of identity and access management (IAM) solutions, experienced a data breach affecting its customer support system. This incident...

IT Security 4 min read Read

Key Manager Plus’ feature highlights from 2023

Happy New Year from Key Manager Plus! Though years may pass, one thing that never changes is our commitment towards providing hassle-free certificate life cycle...

Key Manager Plus 2 min read Read

Adopting the 5S strategy in cybersecurity

The 5S strategy has long been considered a reliable approach to workplace organization. Originated and developed as a strategy to facilitate just-in-time manufacturing in post-war...

IT Security 2 min read Read

MOVEit mayhem: Attackers found, patch released, but no end in sight

The entire cybersecurity realm is buzzing over zero-day vulnerabilities and SQL injection attacks owing to the MOVEit Transfer MFT breach. In case you missed it, here’s...

IT Security , Log360 5 min read Read

Unravelling the TDIR framework: Conception, evolution, and categorization

Cybersecurity is a mix of both reactive and proactive approaches. In the past, enterprises were often limited to the reactive approach. With compliance and security...

IT Security 4 min read Read

Latitude data breach: How one click could cost you everything

Imagine clicking on a seemingly harmless link and unknowingly giving away your personal and financial information to cybercriminals. Sounds like a nightmare, right? This nightmare...

General , IT Security , Log360 2 min read Read

Will predictive AI revolutionize the SIEM industry?

The cybersecurity industry is extremely dynamic and always finds a way to accommodate the latest and best technologies available into its systems. There are two...

IT Security , IT Security 3 min read Read