Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Forrester TEI study quantifies the real impact of ManageEngine Endpoint Central

A decade ago, endpoint management meant managing desktops in a single office. Today, IT teams are responsible for managing an ecosystem of desktops, laptops, mobile devices, tablets, IoTs, POS systems and more–spread across cities, countries and time zones. It is not the number or variety of devices that is challenging–it is the complexity of managing and securing them all. And it's not because IT teams lack necessary tools; it is because they are drowning in them.

Top tips to build a human firewall

Top tips is a weekly column where we highlight what’s trending in the tech world and list ways to explore these trends. This week, we will explore ways on how to strengthen any company's first line of defense against cyberattacks. No matter how advanced your cybersecurity tools are, they’re only as strong as the people using them. Phishing scams, social engineering, and weak passwords are threats that often succeed not because systems fail but because humans do.

The dark side of smart devices: Is convenience costing us?

Smart devices entered the market with bold promises of unmatched convenience, control, and functionality. With the popularity of smart homes on the rise, there's no denying that this tech is here to stay. And why wouldn't it be? These devices are undoubtedly convenient to use and offer legitimately practical features like voice activation, remote control, and monitoring.

ManageEngine Log360 launches Zia Insights, its first AI-powered contextual analytics for modern SOCs

Security operations centers (SOCs) have been drowning in a sea of alerts, raw logs, and siloed data for quite sometime now. A study by Morning Consult and IBM showed that 63% of alerts handled by SOCs daily are false positives or low priority, and analysts spend one-third of their day investigating these alerts. Yet, the information needed to detect, investigate, and respond to threats is often already present, just fragmented and buried. This is where AI steps in to rewrite the rules of engagement.

Top tips: Making the switch to a passwordless future

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week, we’re exploring how passwordless authentication is becoming the new standard for secure, seamless access. For decades, passwords have been the cornerstone of digital authentication. But in today's cyberthreat landscape, this is no longer enough.

Episode 23: The truth about compliance, audits, and privacy ft. Kudiyarasan Balakrishnan

What does compliance really mean and why does it matter? In this episode of Server Room, we’re joined by Kudiyarasan Balakrishnan, Manager of Compliance at Zoho Corp., to demystify compliance, audits, privacy frameworks like ISO, GDPR, and more. Learn how compliance can drive innovation instead of slowing you down. It enables a business to operate confidently, securely, and responsibly while still moving fast.

Top DNS resolver security threats you can't ignore in 2025: Expert guide and prevention tips

DNS is often referred to as the internet’s phonebook, translating human-readable domain names into IP addresses. But this essential service also makes DNS a prime target for cyberattackers. With the increasing volume and sophistication of DNS-based threats, including DNS spoofing, cache poisoning, and DDoS attacks, it’s crucial to understand the risks involved.

ARP spoofing explained: How attackers exploit the Address Resolution Protocol

Imagine handing over your house keys to someone who looked trustworthy - only to discover later they were an impostor. Everything that entered or left your home was compromised, and you never saw it coming. That’s what happens in your network when ARP spoofing strikes. The Address Resolution Protocol (ARP) helps devices find each other on a local network by matching IP addresses to MAC addresses.