Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Navigating the cyber battleground: The vital role of network security policy management

The landscape of cyberthreats is continuously evolving, and to keep pace organizations employ robust network security strategies. This involves creating, executing, and maintaining a set of guidelines, or network security policies, on how the organization’s network should be protected from external threats. This process is termed network security policy management (NSPM) and it’s instrumental in maintaining the integrity of the network.

Windows Defender Firewall misconfigurations and GPOs: Connecting the dots

Many enterprises have a variety of aspects that make up their networks, like Windows Defender Firewall, GPOs, and an AD infrastructure. Vulnerabilities in any part of the network can have a domino effect; once the first domino falls, the entire trail will go down with it, which can cause irrevocable damage to your network.

Top tips: Three ways to defend your critical IT infrastructure against ransomware

Top tips is a weekly column where we highlight what’s trending in the tech world today and list out ways to explore these trends. This week we’re looking at five ways you can protect your IT infrastructure against ransomware attacks. Every year, the month of October is observed as Cybersecurity Awareness Month. This year, we wanted to dedicate a special entry in our top tips column to one of the fastest-growing digital economies in the world: the Middle East.

ManageEngine PAM360 now automates privileged access routines for over 800 enterprise apps-powered by Zoho Flow!

We are delighted to announce that ManageEngine PAM360 will now utilize Zoho Flow’s extensive product gallery to automate privileged access security workflows for more than 850 business applications and enterprise IT management tools.

Learning about Saudi Arabia's Personal Data Protection Law and the compliance solution

The Saudi Data and Artificial Intelligence Authority (SDAIA) has decided its’ about time to call for the Kingdom of Saudi Arabia’s first data protection law. The Personal Data Protection Law (PDPL), originally included a public consultation component when it was launched by SDAIA in late 2022. Since then, the public consultation was withdrawn, and the draft version of the data protection law augmenting PDPL was issued.

Top tips: Five ways to prevent a cybersecurity disaster

Top tips is a weekly column where we highlight what’s trending in the tech world today and list out ways to explore these trends. This week we’re looking at five steps every organization should take to prevent cyberattacks and keep their data secure. The recent ransomware attacks on MGM Resorts in Las Vegas and Marriott Hotels have shown that we must be better prepared to identify and prevent phishing attacks.

Fortify data security with FIPS-compliant OpManager

In an era where data breaches and cyberthreats are a constant concern, ensuring the security of your network monitoring systems is paramount. The Federal Information Processing Standards (FIPS) compliance standard serves as a robust benchmark for data security. In this comprehensive blog, we’ll explore the importance of FIPS compliance and delve into how OpManager, leading network management software, adheres to these standards to bolster security for its users.

Gambling away your data: What we know about the Las Vegas cyberattacks

MGM Resorts has announced that it will be shutting down 12 of its hotels and casinos in and around Las Vegas. The reason—a ransomware attack of unknown magnitude on servers containing a goldmine of customer data. MGM reports that it managed to detect the breach at a fairly early stage and notify the authorities and law enforcement, but the damage incurred is yet to be evaluated.