Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

August 2022

3 examples of organizations that could have benefited from a CASB

In recent times, the widespread use of cloud services has become common for most organizations. While many organizations now enjoy the savings and convenience afforded by hosting their data and services on cloud platforms, this shift towards the cloud brings with an increased vulnerability to data theft and cyberattacks.

Security use cases: The key to test the readiness of your SIEM solution

Organizations have started considering cybersecurity as a top priority lately. The amount of money invested in IT infrastructure is increasing at an exponential rate. Further, dedicated teams are formed to monitor and optimize the performance of the different solutions that each organization has in its environment. Similarly, when it comes to cybersecurity, it’s become essential to evaluate and quantify the security posture of every organization.

Five Worthy Reads: Clean up your digital footprint

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we delve into digital footprints for individuals, organizations, and explore how much power these “e-footprints” have over us. Illustration by Vimal Kumar Pandiyan A digital footprint, also referred to as a dossier, is a body of data that results from your online activity.

ManageEngine has been recognized once again in the Gartner Magic Quadrant for Unified Endpoint Management

We’re delighted to announce that ManageEngine has been recognized among five other vendors in 2022 Gartner Magic Quadrant for Unified Endpoint Management. Vendors were evaluated based on their ability to execute and completeness of vision. This recognition comes after IDC naming us a Leader in the IDC MarketScape reports for UEM tools.

7 cybersecurity challenges the finance sector faces (and how to avoid them)

The financial sector continues to be victimized by cyberattacks, making it the third-most targeted sector after healthcare and manufacturing. The finance sector alone reported 2,527 incidents, 690 of which ended up in disclosure of data. In the always vulnerable finance industry, it's critical for organizations to employ an endpoint management system in addition to an antivirus solution in order to shield themselves. Employing an endpoint management system that has built-in antivirus capabilities is an added advantage.

Guide to keeping cyber insurance premiums low amidst rising threats

Cyberattacks have become an unavoidable part of the technology landscape in recent years with attacks like ransomware, phishing, and whaling reaching an all-time high. According to IBM’s Cost of Data Breach Report 2022, the average cost of a ransomware attack is $4.54 million and the average cost of a breach in the US alone is $9.44 million. Cyber insurance is important in these instances, because it helps cover the financial losses incurred.

Automated incident response using Log360

Security teams are often overwhelmed with alerts daily, including false positives, and actions that require attention but might be placed on the back burner. But when alerts start stacking up and aren’t addressed promptly, important security concerns might go unnoticed and these can spiral into a data breach. The time to detect and respond to security incidents should be as short as possible to limit the time an attacker can carry out an attack.