Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ManageEngine

Canadian privacy laws revisited: Is your organization staying ahead of the curve?

Illustrated by Dorathe Victor The Personal Information Protection and Electronic Documents Act (PIPEDA) is well-known if you are an organization based out of Canada. In place for more than 20 years, it sets out rules for how businesses should collect, use, and disclose personal information while dealing in commercial activities. Some pieces of personally identifiable information (PII) that are protected under PIPEDA are name, age, ID number, income, ethnic origin, blood type, and more.

[Thoughtleadership webinar] The emerging cyber threat and attack trends of 2022 with Bryan Seely

Tune in to this webinar featuring ManageEngine product expert, Ganesh, and cybersecurity expert and ethical hacker, Bryan Seely, to understand the emerging cyber threat trends in 2022, and how organizations can stay on top of attacks with a solid PAM programme.

Protecting your Microsoft 365 services against NOBELIUM attacks [E-book]

In December 2020, Microsoft came forward with details regarding what is now being considered the most extensive, severe cyberattack in history—the NOBELIUM attack. This shocking security breach by NOBELIUM, a group of Russian hackers, brought the cybersecurity world to a standstill with its well-planned and well-executed hacking. It compromised several organizations through a supply chain attack.

Five worthy reads: Cybercrime and its impact on the economy

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about how a country and global economy is impacted when a cybercrime happens, how every citizen is victimized, and what governments are doing to mitigate this rising issue.

Endpoint management: A must-have for the financial sector

It’s almost that time of the year to file taxes in Portugal, so John opens the email he received asking him to submit his taxes. It’s from a bank he trusts, so he follows the instructions in the email and proceeds to download the attached PDF. Little did he know that when he clicked the links in the email body, the Lampion trojan was downloaded from an online server.

Getting the best out of your SIEM

An effective SIEM solution ingests logs from different network sources to give visibility into user and host activities. It uses capabilities such as threat intelligence and behavioral analysis to set correlation rules to spot malicious activities within a network. This e-book will help you obtain the maximum value from your SIEM deployment by guiding you through 10 of the most critical capabilities capabilities.

The New York Racing Association ensures a secure IT environment using AD360

Rabindra Mohan, technical operations manager at the NYRA, was tasked with improving his organization’s remote work capabilities. However, due to the inherent nature of the business, the IT team had to take a very hands-on approach to their operations. Mohan needed a solution that could be automated and deployed right out of the box. As part of the IT team’s broader vision, Mohan also wanted to manage the NYRA’s IT environment on the go from a mobile app.

4 golden reasons for equipping your SOC with ManageEngine Log360

Cyberattacks are fast becoming a part of our daily lives. Multiple sources such as Norton Security and Forbes suggest that since the pandemic, attacks are not only increasing in number, but they are becoming more targeted and sophisticated. The attackers using Ransomware as a Service and double extortion techniques are prime examples of how sophisticated attacks are becoming these days. Norton Security states that there are more than 2,200 cyberattacks on a daily basis.