Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ManageEngine

Five worthy reads: Into the metaverse

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we will explore the concept of the metaverse and what it holds for the future of technology and user experience. Illustration by Dorathe Victor When Facebook changed its name to Meta in September 2021, a new buzzword took over the tech world: the metaverse.

Data Privacy Day, Part 1: What you need to know about data privacy

Data Privacy Day (known in Europe as Data Protection Day) is an international event aimed at raising awareness about data privacy and protection practices among businesses as well as internet users. In this blog series, we’ll attempt to do the same. This first blog post will shed light on data privacy as a whole, important data privacy laws, and some data collection practices that can help you adhere to these laws.

Saudi Aramco data breach: A reminder to start monitoring RPIs

On June 23, 2021, threat actors reported that they had stolen a terabyte of data from Saudi Aramco, a state-owned oil company in Saudi Arabia. The threat actors released samples of data they had procured after redacting critical information. They also claimed to have detailed information on Aramco’s employees, such as their full names, photographs, passport scans, emails, phone numbers, residence permit (Iqama card) numbers, job titles, employee ID numbers, and family information.

Getting the best out of Samsung Knox management with Mobile Device Manager Plus

In case you missed it, Samsung Knox has verified Mobile Device Manager Plus as a Knox Validated Partner solution. This means that our EMM solution meets its business-level requirements for 2022, and that we support a wide range of features to help you get the best out of all your mobile devices that support Samsung Knox capabilities.

Looking back: Analyst recognitions in 2021

The year 2021 started off with organizations slowly reopening their doors and welcoming back their employees. This couldn’t happen overnight, of course. It meant devising new IT strategies to accommodate a hybrid workforce. Ensuring the organization’s business continuity is crucial for it’s sustenance, and this became the IT department’s primary mission.

Understanding Saudi Arabia's new Personal Data Protection Law

The processing of data is a long-standing debate among governments, businesses, and tech giants alike. Major corporations are identifying data privacy violations and sharing how personal data should be handled and shared ethically. Government entities have framed their own laws on data protection and privacy to protect the personal data of their residents.

New Log4j flaw: 5 reasons why organizations should worry now

The world of cybersecurity has been constantly challenged since the pandemic started. With the dust still settling, a new concern has taken the entire cyber landscape by storm. A flaw in Log4j, a widely used Java-based logging library, allows hackers unbridled access to computer systems. The vulnerability (CVE-2021-44228) affects everything from the cloud to security devices. Attackers have come up with worms that can spread independently from one vulnerable system to another.

Five worthy reads: Congratulations! You have just been socially engineered

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about social engineering, its types, its evolution, and how to avoid falling victim to a social engineering attack. Kevin David Mitnick is considered one of the most famous social engineers among the IT community. Kevin is now a top cybersecurity speaker and a best-selling author.