Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ManageEngine

Redefining AD risk assessment with ADManager Plus

Today, the process of digitization has become synonymous with progress and innovation. As organizations embrace digital transformation post-pandemic, the importance of securing your digital assets cannot be overstated. It is crucial to keep up with the cyber risks and protect your organization. The core of your operations lies within your Active Directory (AD), as it manages user identities, permissions, and access controls. At ManageEngine, we understand the importance of securing your AD environment.

Why Indian companies need to adhere to the DPDP Act

The Indian government implemented the Data Protection and Privacy (DPDP) Act, a groundbreaking measure designed to regulate data protection within the country, in August 2023. In today’s rapidly evolving digital era, it has become increasingly important to have robust legislation in place to safeguard people’s data. With so much information being shared online, this act protects our data from misuse and unauthorized access.

Data poisoning: Prevention strategies to keep your data safe

The amount of data generated and fed into AI systems has increased quickly over the last few years. Attackers are taking advantage of the massive increase in data volume to contaminate the data input in training datasets, resulting in incorrect or malicious results. In fact, at a recent Shanghai conference, Nicholas Carlini, research scientist at Google Brain, stated that data poisoning can be accomplished efficiently by modifying only 0.1% of the dataset.

Five worthy reads: Making AI functionality transparent using the AI TRiSM framework

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we will explore the pivotal role of the AI trust, risk, and security management (AI TRiSM) framework in safeguarding the functionality of AI and understand why it is crucial for our protection. Any relationship needs to be fortified with trust to be successful. The human-AI relationship is not an exception.

Understanding the Okta supply chain attack of 2023: A comprehensive analysis

In October 2023, Okta, a leading provider of identity and access management (IAM) solutions, experienced a data breach affecting its customer support system. This incident raised serious concerns about the security of sensitive information entrusted to Okta by its customers and partners.

Top tips: Defend your organization's supply chain with these 3 tips

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week, we’re looking at some of the cybersecurity strategies for supply chains. Cyberattacks have been increasing, and supply chains have taken a hit. In 2022, the United States witnessed a surge in supply chain cyberattacks, which affected 1,743 entities—the highest reported figure since 2017.

The rise of QR code threats: From convenience to caution

How often do you scan QR codes without a second thought? What if that innocent decision could expose you to a growing threat in the digital landscape? QR codes—short for quick response codes—have soared in popularity, becoming essential in our digital era. Originally designed for industrial tracking, their ease of use has made them a go-to tool for information sharing.

Navigating the threat landscape of LockBit

Imagine a virtual phantom slipping through digital shadows, silently locking away data, and leaving a haunting message demanding a ransom. That is LockBit ransomware, the stealthy troublemaker in the world of cybersecurity. In this blog, let’s unpack the mysteries of LockBit: how it sneaks in and wreaks havoc and why businesses should be on high alert.

USB review, Part 1: How are USB flash drives a security risk?

We’ve all used pocket-sized USB drives to store and transfer data. We’ve also lost them countless times. USB sticks are a necessary convenience accompanied by complex and varied risks. Besides the loss of the actual ”pendrives” as they’re also known, organizations fall prey to targeted USB attacks, which are quite common. Threats designed for USB exploits have risen from 37% to 52%, according to Honeywell’s Industrial Cybersecurity USB Threat Report 2022.

AI and digital twins: A roadmap for future-proofing cybersecurity

Keeping up with threats is an ongoing problem in the constantly changing field of cybersecurity. The integration of artificial intelligence (AI) into cybersecurity is emerging as a vital roadmap for future-proofing cybersecurity, especially as organizations depend more and more on digital twins to mimic and optimize their physical counterparts.