Firewall Analyzer | October 23, 2023Navigating the cyber battleground: The vital role of network security policy management The landscape of cyberthreats is continuously evolving, and to keep pace organizations...
DataSecurity Plus | October 11, 2023Access granted: Mastering the art of permissions Back in the 20th century, cyberattacks were harder to execute because most computers were...
ADAudit Plus | October 5, 2023The Windows LDAP bind security vulnerability you should know about The Lightweight Directory Access Protocol (LDAP) is used by directory clients to access...
Log360 | September 18, 2023Cybersecurity KPI metrics that CISOs should track It's important for chief information security officers (CISOs) to track certain metrics...
Log360 | September 14, 2023Staying ahead of LockBit ransomware attacks LockBit is a Ransomware as a Service (RaaS) provider accountable for most LockBit...
Log360 | August 10, 2023[Webinar] How to bolster cybersecurity by gaining complete network visibility To prevent cyberattacks, you need complete visibility into all the events that occur...
Log360 | August 1, 2023ManageEngine Recognized as a Customers' Choice in 2023 Gartner® Peer Insights 'Voice of the Customer': Security Information and Event Management (SIEM) for the fourth time We're thrilled to announce that ManageEngine has once again been recognized as a...
Log360 | July 27, 2023Comprehensive visibility is the foundation for effective threat detection and response Businesses today are more dependent than ever on technology, making strong threat...
Log360 | July 25, 2023Breaking down India's cybersecurity: A comprehensive mid-year review and analysis As we cross the halfway mark of this year, we need to evaluate and understand the rising...
Log360 | July 10, 2023[Webinar] How to implement an effective data loss prevention strategy Data is your organization's lifeblood. Ensuring it doesn't fall into the wrong hands must...
Log360 | June 5, 2023[Webinar] How to measure the effectiveness of your security operations center Network visibility is the first step towards security. You need to know what activities...
Log360 | May 26, 2023CISO handbook: Cybersecurity metrics, budgeting, and leadership [E-book] Chief information security officers (CISOs) are the backbone behind the security...