Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ManageEngine

Featured Post

5 best practices for imaging hard drives

Imaging a machine with the relevant OS and disk partitions is the first step involved in OS deployment. You can either image machines that are online with applications running or machines that are shutdown. In this section we will discuss the five best practices to be followed while imaging.

Beyond the ransom: Unpacking the true cost of a ransomware attack

Ransomware has become a significant threat in today’s digital landscape, with cybercriminals using it as an effective means of making money, often with a low cost and high profit margin. Victims rarely recover their stolen data in full, despite promises from the perpetrators, so most of the time paying the ransom is not a viable solution.

Detecting and mitigating ransomware using Endpoint Central.

Is your organization at risk of a ransomware attack? Don't wait until it's too late. With Endpoint Central's advanced anti-ransomware solution, you can detect and block intrusions in real-time, using our multi-patented technology and AI-assisted detection engine. Keep your data safe and prevent costly ransom payments with Endpoint Central's 24/7 threat detection and rapid response capabilities.

Perform thorough packet filtering in real time with deep packet inspection to prevent hidden threats and attacks

Deep packet inspection (DPI), as the name suggests, is a type of network packet filtering and an advanced mode of examining network packets. In DPI, network packets that are transmitted through an inspection point are evaluated. At this inspection point, a DPI tool determines where the packets came from, whether a service or application. With DPI, packets are categorized, inspected, and redirected to prioritize business-critical applications and other online services.

Vow to safeguard digital identities from cyberattacks this Identity Management Day

As our lives become more intertwined with the digital world, cyberattacks are growing in sophistication. And since the pandemic, the prevalence of hybrid work culture has posed additional security challenges. This creates pressure for businesses to implement advanced measures to safeguard their users’ digital identities and network resources. Failing to do so not only damages an organization’s reputation, but also leads to numerous legal issues and heavy recovery costs.

Data sovereignty in the cloud: A Canadian perspective

Cloud computing has made its way to organizations’ IT infrastructure strategy rapidly over the past few years. In particular, Canadian businesses are showing an increased adoption. This article decodes how Canada’s IT infrastructure shaped up in the last decade, why data sovereignty is now a hot topic, and what the future holds for the cloud. While on-premises IT infrastructure continues to be relevant even today, both SMBs and enterprises are now embracing the cloud more than ever.

Rogues On The Rise: Is Your Network Secure Enough?

Rogue device intrusion has become a nightmare for admins running modern IT infrastructures. While these infrastructures are already under constant attack from several malicious entities, other factors like BYOD policies, IoT, and shadow IT make it a challenge to know about every connected device. Even with vigilant security measures in place rogue devices can seep through the cracks.

Grazie Ragazzi-But it's not Ferrari who's saying it this time!

Ferrari’s woes seem to be continuing from F1 tracks to their data. And surprisingly, ransomware today encrypts files as fast as a Ferrari V8 goes from 0 to 60 mph. The current ransomware attack means cybercriminals now have access to confidential client data. Remarkably, this isn’t the first time Ferrari has been the victim of a ransomware attack; in October of last year, critical documents belonging to the brand were leaked online.

Five worthy reads: The digital dark age-Exploring the flip side of a data-driven world

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, to mark the upcoming World Backup Day, we explore the concepts of data decay and the digital dark age. Data is often equated with oil and gold because of how valuable it can be. On the personal front, it comprises anything from digital copies of official documentation to precious memories.

Inside the mind of a hacker: Alternate identities and varied behavioral patterns

The boom of information technology opened an entirely new world of identities and opportunities. Most users’ journies in the cyber world started with the creation of an email address. That email address, which served as an online identity, eased communication between two users, breaking location barriers. Fast-forward to today: A user can create as many accounts as they want across different platforms on the internet, using a wide range of devices such as tablets, mobile phones, and laptops.