DataSecurity Plus | October 11, 2023Access granted: Mastering the art of permissions Back in the 20th century, cyberattacks were harder to execute because most computers were...
ADAudit Plus | October 5, 2023The Windows LDAP bind security vulnerability you should know about The Lightweight Directory Access Protocol (LDAP) is used by directory clients to access...
Log360 | September 18, 2023Cybersecurity KPI metrics that CISOs should track It's important for chief information security officers (CISOs) to track certain metrics...
Log360 | September 14, 2023Staying ahead of LockBit ransomware attacks LockBit is a Ransomware as a Service (RaaS) provider accountable for most LockBit...
IT Security | August 21, 2023Adopting the 5S strategy in cybersecurity The 5S strategy has long been considered a reliable approach to workplace organization....
Log360 | August 10, 2023[Webinar] How to bolster cybersecurity by gaining complete network visibility To prevent cyberattacks, you need complete visibility into all the events that occur...
Log360 | August 1, 2023ManageEngine Recognized as a Customers' Choice in 2023 Gartner® Peer Insights 'Voice of the Customer': Security Information and Event Management (SIEM) for the fourth time We're thrilled to announce that ManageEngine has once again been recognized as a...
Log360 | July 27, 2023Comprehensive visibility is the foundation for effective threat detection and response Businesses today are more dependent than ever on technology, making strong threat...
Log360 | July 25, 2023Breaking down India's cybersecurity: A comprehensive mid-year review and analysis As we cross the halfway mark of this year, we need to evaluate and understand the rising...
Log360 | July 10, 2023[Webinar] How to implement an effective data loss prevention strategy Data is your organization's lifeblood. Ensuring it doesn't fall into the wrong hands must...
IT Security | June 28, 2023MOVEit mayhem: Attackers found, patch released, but no end in sight The entire cybersecurity realm is buzzing over zero-day vulnerabilities and SQL injection...
Log360 | June 5, 2023[Webinar] How to measure the effectiveness of your security operations center Network visibility is the first step towards security. You need to know what activities...