Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Top tips: Five ways to prevent a cybersecurity disaster

Top tips is a weekly column where we highlight what’s trending in the tech world today and list out ways to explore these trends. This week we’re looking at five steps every organization should take to prevent cyberattacks and keep their data secure. The recent ransomware attacks on MGM Resorts in Las Vegas and Marriott Hotels have shown that we must be better prepared to identify and prevent phishing attacks.

Fortify data security with FIPS-compliant OpManager

In an era where data breaches and cyberthreats are a constant concern, ensuring the security of your network monitoring systems is paramount. The Federal Information Processing Standards (FIPS) compliance standard serves as a robust benchmark for data security. In this comprehensive blog, we’ll explore the importance of FIPS compliance and delve into how OpManager, leading network management software, adheres to these standards to bolster security for its users.

Gambling away your data: What we know about the Las Vegas cyberattacks

MGM Resorts has announced that it will be shutting down 12 of its hotels and casinos in and around Las Vegas. The reason—a ransomware attack of unknown magnitude on servers containing a goldmine of customer data. MGM reports that it managed to detect the breach at a fairly early stage and notify the authorities and law enforcement, but the damage incurred is yet to be evaluated.

Staying ahead of LockBit ransomware attacks

LockBit is a Ransomware as a Service (RaaS) provider accountable for most LockBit ransomware attacks in 2023. The LockBit RaaS group came into existence in 2019 and has posed great challenges to security experts ever since. A recent report states that LockBit accounted for over one-third of all ransomware attacks in the latter half of 2022 and the initial quarter of 2023.

Top 5 features to look for in an advanced network port scanner

Network security has become paramount in safeguarding sensitive data and ensuring maximum efficiency in organizations today. As port scanning attacks increase, it’s important to stay vigilant to protect your enterprise systems from such threats. One essential tool that every network admin should have is the advanced network port scanner, which can help to identify and assess network port and switch port vulnerabilities.

ManageEngine recognized as a Challenger in the 2023 Gartner Magic Quadrant for Privileged Access Management

We are excited to tell you that ManageEngine has been named a Challenger in the 2023 Gartner Magic Quadrant for Privileged Access Management. We believe this recognition reflects ManageEngine’s commitment to deliver a full-fledged privileged access management (PAM) experience for the modern enterprise. The Gartner Magic Quadrant evaluates vendors in a specific market and positions them based on their ability to execute and their completeness of vision.

Comply with India's Digital Personal Data Protection Act using Endpoint Central

Many countries across the globe are realizing the importance of the right to privacy in the digital era. The GDPR, the data privacy legislation for the European Union, came into force in 2018 and became the guiding star for an array of privacy laws. The Digital Personal Data Protection Act (DPDPA) by the Indian government is the latest privacy law aimed at protecting individuals’ privacy while ensuring hassle-free business operations.

The new master mind of cybercrimes: Artificial intelligence

Imagine an AI overlord sitting in a dark basement, plotting world domination through cybercrime. While the idea might seem like a sci-fi flick, it’s actually closer to reality than we think. AI has emerged as a game changer in a constantly evolving cyber landscape. AI algorithms can learn and adapt to security measures quickly, making them the ultimate cyber villains.

Five worthy reads: What's cooking between cookie consent and user privacy?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore website cookies, their role in managing user identity and behavior, and the key ingredients to a safe cookie policy. There’s no worse way to enter a website than to be met with a cookie consent encounter. But how many of us click “Accept All” without much thought, just to rid ourselves of the interruption?

The MOVEit Transfer vulnerability affects 40 million people worldwide

In over 600 data breaches, 40 million individuals were affected across the globe due to the MOVEit Transfer vulnerability. Between June 2023 and the present day, healthcare information, educational records, financial records, personal information, Social Security numbers, and insurance details have been either stolen or wiped out by threat actors who abused the MOVEit Transfer vulnerability.