Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Protection Is Not Just A Cyber Conversation

Before I became an advisor to Netskope, I was a long serving CIO and CEO for organisations including Bayer and Philips. I have spent many hours sitting in board meetings discussing data protection with colleagues and as a result I am confused by assertions I hear that data protection is only the IT team’s problem. In my experience, the majority of data protection conversations that reach the board are, in fact, driven by legal teams, who then partner with IT to devise and execute plans.

Yet Another Perspective on Prototype Pollution

JavaScript is a programming language based on prototypes instead of classes. When a new object is created, the features of the prototype object are inherited – this includes arrays, functions, and even class definitions. The new object can also act as a template for other inheriting objects, transferring its properties, and creating the prototype chain.

How Phishing works

Social engineering is the art of manipulating people so that they give up confidential information or perform an action you ask them to do. Social engineers are usually trying to trick victims into giving them their credentials, bank information or access to computers to secretly install malicious software. Find out how phishing actually works and what you can do to reduce the risk.

Locking PDF files to prevent theft

If you don't want anyone to steal or add to the classified contents in your PDF files then you need to adequately protect them. There are several reasons why you need to make sure that sensitive data in PDF files is protected. But at the same time, since the PDF format is a commonly shared document, it must be easily accessible to your users or those who read and review them. In the absence of PDF file security, you may be faced with severe consequences of a data breach. Hence, locking PDF files with right document security solution can effectively keep sensitive information within the files secured.

We did it again! ManageEngine AD360 and Log360 are among the 100 named in the 2022 Fortress Cyber Security Awards

We are excited to announce that ManageEngine has been recognized in three different categories by the Business Intelligence Group in its 2022 Fortress Cyber Security Awards. It is a moment of pride for us to see two of our solutions, AD360 and Log360, win more awards. AD360 was declared a winner in the Authentication and Identity category, and Log360 won awards in both the Threat Detection and the Incident Response categories.