Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Protecting digital privacy and using technology for good

In the latest episode of the ManageEngine Insights' podcast, John Donegan speaks with Frank Satterwhite, the principal cybersecurity consultant at 1600 Cyber, a cybersecurity consultancy based out of Germany. Satterwhite discusses how he uses music to inform communities about technology, and he addresses his top cybersecurity concerns of the moment, including the fight against disinformation online.

Lookout and Jamf: Defending Against Mobile Threats

I’m pleased to share that Jamf and Lookout have formed a partnership to integrate Jamf Pro with Lookout Mobile Endpoint Security. Jamf provides mobile device management for Apple devices and specializes in serving IT professionals, schools and small businesses. Together, Lookout and Jamf enable your organization to deploy and provision iOS devices while protecting them against mobile threats such as phishing and network attacks.

Overcoming Compliance Issues in Cloud Computing

The benefits of organizations moving some or all their IT workloads to the cloud are well-known and numerous. There are several challenges to successful cloud adoption, though, and one of the most important of them is compliance. Whether your cloud use case is low-cost data storage, scaling your infrastructure for critical business apps or disaster recovery, this article helps inform you about and overcome compliance issues in cloud computing.

The Anatomy of Mega-breaches: An Analysis of the Top 100 Data Breaches of the Past 15+ Years

In today’s world, data breaches are a fact of life for both consumers and companies. It’s become somewhat of a truism to point out that for many companies breaches are a matter of if not when as defenders are at a significant disadvantage.

The PCI DSS Series - Top 10 Myths

There are plenty of myths and misconceptions around PCI DSS. This video guides you through this minefield - making sure you understand each myth can not only make the PCI DSS compliance process easier but also more successful. Jim shares his 10+ years' experience as a QSA to explain where these misconceptions come from and how to successfully work around them.

How secure use of the cloud can digitally transform your business

Companies that move towards digital transformation can innovate more quickly, scale efficiently and reduce risk by implementing cloud security best practices. Businesses must keep up with growing customer expectations and the pace of innovation by adopting a digital-first business model. But for many businesses, digital transformation remains a huge challenge. Company culture and technology must align for a digital-first business model to be effective.