General | October 24, 2020Five worthy reads: Preparing an incident response plan for the pandemic and beyond Illustration by Ilamparithi Raju Five worthy reads is a regular column on five noteworthy...
General | October 21, 2020Sophisticated phishing Most of us can think of a time when we received a phishing email. In fact, most phishing...
Log360 | September 30, 2020Understanding how attackers move inside your organization Cyberthreats have been coming at us from the left, right, and center. The number of...
Log360 | September 17, 2020Why following NIST guidelines will strengthen your SIEM framework The National Institute of Standards and Technology (NIST) is a federal, non-regulatory...
Log360 | August 12, 20205 tips to avoid cyberattacks on EdTech platforms As the COVID-19 pandemic rages on, many educational institutions have been forced to shift...
IT Security | July 29, 2020Breach notification requirements of POPIA: The importance of SIEM A crucial aspect of the Protection of Personal Information Act (POPIA) is the notification...
Security Information and Event Management | July 21, 2020Security operations center, Part 1: The guardian of your organization Hacking is finding a way to accomplish a goal, never accepting no for an answer, and being...
Log360 | July 20, 2020Business Intelligence Group's 2020 Fortress Cyber Security Award for Threat Detection goes to... We are excited to share that ManageEngine's Log360 has been awarded the 2020 Fortress...
IT Security | July 15, 2020ManageEngine named a 2020 Gartner Peer Insights Customers’ Choice for Security Information and Event Management! We're excited to announce that ManageEngine has been recognized as a Customers’ Choice in...
IT Security | July 14, 2020How to protect your IT infrastructure from a Maze ransomware attack Pitney Bowes, a global package delivery giant, has been hit by a second ransomware attack...
General | May 13, 2020Cybersecurity use cases for better remote workforce management Credits- Illustrator: S Amirthalingam In the new normal, if your business has chosen...
Security Information and Event Management | May 11, 2020SQL Server, Part 3: Adopting the principle of least privilege In the previous blog in this series, we discussed authentication and authorization...