Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2022

Five worthy reads: Privacy vs. monetization

Since the advent of the internet, personal data has been collected by internet companies in exchange for free services or content. This barter was also intended to provide personalized services to users. However, these data harvesters started selling data to advertising agencies for huge profits, which resulted in predatory marketing efforts towards internet users.

Checksum: How does it ensure security for your vital data?

A checksum is small code of computed information that deals with data integrity and security. It is vital for huge data files (in gigabytes) being downloaded from any online site. It checks whether the downloaded file is missing any bytes and is downloaded correctly. The checksum value changes even if there is a small change in the downloaded file or data.

Cybersecurity compliance: Time to clean up the cobwebs

Cybersecurity compliance became prominent in the last decade. From being a trivial part of an organization’s business strategy in the early years to being a core objective now, cybersecurity compliance has come a long way. Today, organizations have dedicated teams and personnel, such as chief compliance officers, to ensure that they stay compliant with the relevant standards pertaining to their industry and location. It is essential for organizations to stay updated to avoid sanctions.

A practical approach to Active Directory Domain Services, Part 9: An AD reality check

Have you looked into some of the most well-known Active Directory (AD) attacks from around the world? Do you understand the nuances of these popular attacks and can you put the AD fundamentals you learned in the earlier parts of this blog series to good use?

We did it again! ManageEngine AD360 and Log360 are among the 100 named in the 2022 Fortress Cyber Security Awards

We are excited to announce that ManageEngine has been recognized in three different categories by the Business Intelligence Group in its 2022 Fortress Cyber Security Awards. It is a moment of pride for us to see two of our solutions, AD360 and Log360, win more awards. AD360 was declared a winner in the Authentication and Identity category, and Log360 won awards in both the Threat Detection and the Incident Response categories.

[PAM Masterclass] Episode 4: Simplifying privileged session management

In this episode of PAM masterclass, you will learn how to launch privileged sessions by configuring remote access pathways. You will also gain insights into how admins can monitor and record live sessions and suspend malicious user activities using ManageEngine's flagship PAM suite, PAM360.

A practical approach to Active Directory Domain Services, Part 8: AD attacks

How and why do attackers target an organization’s Active Directory (AD)? This blog, which is part 8 of the series A Practical approach to Active Directory Domain Services, will provide you with the answers. In this part, we will examine what attackers gain by compromising the AD setup. We will also look at some of the most noted means by which AD is compromised. There are two main sections to this blog.

Entering the 7th month of 2022 with 7 prestigious Grand Globee awards

ManageEngine is the proud winner in seven categories of the Information Technology World Awards, the IT industry’s premiere excellence award program. We are honored to be recognized by the only complete IT recognition and achievement award program that covers all the facets of the IT industry. More than 170 judges consisting of industry experts in IT and cybersecurity from around the world were a part of the jury.

ManageEngine captures the Cyber Defense Global InfoSec Awards 2022 spotlight with 5 top honors

At the RSA Conference in San Francisco on June 6, Cyber Defense Magazine celebrated the 10th Annual Cyber Defense Global InfoSec Awards. A prestigious honor in the information security space, the award recognizes businesses that have pioneered cutting-edge solutions to combat current as well as future cyberthreat trends. Of the more than 4,000 reputable information security organizations that took part in this prestigious award, three of our solutions were recognized.

A Microsoft SharePoint Online feature could be the cause of the next ransomware attack

Microsoft SharePoint Online is one of the most widely used content management platforms. Unfortunately, Proofpoint recently discovered that threat actors can abuse a feature in SharePoint Online and OneDrive for Business to encrypt all of your files and hold them ransom.

Kerberos and Active Directory

If you have been researching Active Directory (AD), chances are that you will come across the concept of Kerberos for user authentication and other service request-related functionalities. It is worthwhile to examine the Kerberos protocol in depth and, in turn, appreciate the dependency of AD on Kerberos. Given that Kerberos is an industry standard, you will see that it has become the most widely used network authentication protocol for all Windows environments with operating systems 2000 and later.

Data Privacy Day, Part 2: Overcoming challenges in securing customer information

In part 1 of this series, we discussed data privacy, the related laws, and the data collection practices that help comply with those laws. In this blog, we’ll take a look at the challenges in securing customer data and five effective steps to overcome them. Many countries deem data privacy a fundamental human right and have implemented data protection laws.

Are your credentials safe? Decoding credential phishing attacks

Companies have increasingly allowed bring your own device (BYOD) policies to support remote work, but in today’s cybersecurity landscape, this trend has led to an increased attack surface. Each additional endpoint increases the potential for credentials to be compromised through credential phishing attacks. Hackers are leveraging this trend to conduct insider attacks, leaving businesses vulnerable to data breaches.