Security | Threat Detection | Cyberattacks | DevSecOps | Compliance



5 advantages of deploying a cloud SIEM solution

As organizations are rapidly moving to the cloud to leverage the cloud advantage, services are also moving to the cloud, including cybersecurity solutions such as SIEM. In fact, SIEM as a Service is rapidly gaining momentum as an alternative to traditional, on-premises SIEM solutions. In its 10 Questions to Answer Before Adopting a SaaS SIEM report, Gartner had predicted that by 2023, 80% of SIEM solutions will have capabilities that are delivered via the cloud.


Great Power(Shell) doesn't always come with great responsibility: Sometimes, SIEM is all you need

Fileless threats are on the rise. These threats occur when cybercriminals use pre-existing software in victims’ systems to carry out attacks, instead of using a malicious attachment or file. More often than not, a criminal’s favorite tool for a fileless attack is PowerShell.

Cybersecurity solutions from ManageEngine

As the volume of threats continues to climb, your organization needs to focus on building a solid, proactive cybersecurity strategy. ManageEngine's solutions for identity and access management (IAM), security information and event management (SIEM), endpoint security, network security, and data security will help you proactively identify threats and drastically reduce your vulnerability to attacks.

Safeguard your Active Directory using MITRE ATT&CK techniques

Active Directory (AD) handles sensitive organization data like user credentials, personal information of employees, security permissions, and more. Because of this, AD is prone to being targeted by cyber attackers. Malicious actors are constantly coming up with new attack strategies, making it a challenge for organizations to secure their AD environment. This is why it’s essential that every organization formulates a cyber defense strategy to combat cyber threats and protect their AD.


ManageEngine wins at the Cybersecurity Breakthrough Awards 2022!

It gives us immense pleasure to announce that ManageEngine has been declared a winner in the Cybersecurity Breakthrough Awards 2022. ManageEngine ADAudit Plus, our IT security and compliance solution, was the winner in the User Behavior Analytics Security Solution category. The Cybersecurity Breakthrough Awards aim to recognize the top companies, products, technical innovation, and people that break through the crowded cybersecurity industry.


Are you fishing for tips to thwart phishing scams?

“You’ve inherited a fortune. To transfer the money, I need your bank account credentials.” If you have ever stumbled across something like this, you need to continue reading. According to Verizon’s 2022 Data Breach Investigations Report, 25% of all data breaches consistently involve phishing. How does this happen? The fraudsters who are involved in phishing are some of the best content writers.


A Zero Trust approach to identity security

Zero Trust is the term for an evolving set of cybersecurity paradigms that moves an organization’s defensive measures from static, network-based perimeters to instead focus on users, assets, and resources. It is a security mindset where every incoming connection is treated as a potentially malicious request until explicitly verified. This concept was introduced by John Kindervag, one of the world’s foremost cybersecurity experts, and emphasizes three principles.


How to improve the employee experience while ensuring identity security

Employees in the post-lockdown world have bid goodbye to traditional work environments. Remote and hybrid work is the new normal, with employees expecting full access to their work resources even when working remotely. They might also use multiple devices, even personal ones, to access corporate data.


How not to become a corporate account takeover victim 101

Account takeover is an attack where cybercriminals take ownership of user accounts using stolen credentials. It is essentially an identity theft fraud where the hacker, who now has full control over the user’s account, performs malicious activities posing as the real user. These malicious activities might include sending out phishing emails or messages, stealing and misusing sensitive financial or personal information, or using stolen information to takeover more user accounts.


Password attacks: How to combat them

“Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months.” – Clifford Stoll, Astronomer and engineer This identity security week, it’s important to understand the importance of passwords in cybersecurity, how easily they can be compromised if you are not careful, and how ManageEngine ADSelfService Plus helps fortify your passwords and enhance your organizational security.