Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Grazie Ragazzi-But it's not Ferrari who's saying it this time!

Ferrari’s woes seem to be continuing from F1 tracks to their data. And surprisingly, ransomware today encrypts files as fast as a Ferrari V8 goes from 0 to 60 mph. The current ransomware attack means cybercriminals now have access to confidential client data. Remarkably, this isn’t the first time Ferrari has been the victim of a ransomware attack; in October of last year, critical documents belonging to the brand were leaked online.

Five worthy reads: The digital dark age-Exploring the flip side of a data-driven world

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, to mark the upcoming World Backup Day, we explore the concepts of data decay and the digital dark age. Data is often equated with oil and gold because of how valuable it can be. On the personal front, it comprises anything from digital copies of official documentation to precious memories.

Inside the mind of a hacker: Alternate identities and varied behavioral patterns

The boom of information technology opened an entirely new world of identities and opportunities. Most users’ journies in the cyber world started with the creation of an email address. That email address, which served as an online identity, eased communication between two users, breaking location barriers. Fast-forward to today: A user can create as many accounts as they want across different platforms on the internet, using a wide range of devices such as tablets, mobile phones, and laptops.

Five worthy reads: Hello from the dark side-the nefarious nature of voice AI technology

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we are exploring voice-activated AI technology that allows computers to comprehend and respond to human speech, while analyzing some of its detrimental drawbacks.

ADAudit Plus User Logon Reports, Part 5: Detect users' last logon times on workstations

ManageEngine ADAudit Plus is a UBA-driven auditor that bolsters your Active Active (AD) security infrastructure. With over 250 built-in reports, it provides you with granular insights into what’s happening within your AD environment, such as all the changes made to objects and their attributes. This can include changes to users, computers, groups, network shares, and more.

Navigating cloud security: Insights from our 2023 outlook report

Cloud technology has become a crucial aspect of modern-day businesses due to its scalability and efficiency, making it a popular choice for organizations across all industries. However, the increased surface area for attacks and the different ways they can be executed has left many organizations vulnerable to threats and data breaches. The cloud threat landscape has been rapidly evolving, so adopting a robust cloud security strategy is essential for organizations of all sizes.

Introducing SSH command controls and advanced PEDM capabilities for Linux in PAM360

PAM360 is ManageEngine’s comprehensive privileged access management (PAM) solution designed for enterprises to protect sensitive, privileged identities from internal and external threats. With the principle of least privilege enshrined across the product, PAM360’s privilege elevation and delegation management (PEDM) capabilities help enterprises eliminate standing privileges and provide granular privileged access in a restricted, time-based manner.

Ensure a secure IT environment with integrated network vulnerability management

NIST's National Vulnerability Database shows a quintuple increase in attacks against firmware in the last four years. These statistics indicate that cyber criminals have continually improved their techniques in penetrating your network via firmware vulnerabilities. To combat these malicious actions, let's first discuss the components that are vulnerable to these attacks.