Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Entering the 7th month of 2022 with 7 prestigious Grand Globee awards

ManageEngine is the proud winner in seven categories of the Information Technology World Awards, the IT industry’s premiere excellence award program. We are honored to be recognized by the only complete IT recognition and achievement award program that covers all the facets of the IT industry. More than 170 judges consisting of industry experts in IT and cybersecurity from around the world were a part of the jury.

Tips for Managing Unstructured Data Security

All information is an attractive target for bad actors, but some is inherently more valuable than others. State-sponsored and hacktivist attacks constantly probe enterprise networks seeking to identify the location of sensitive information. Attackers historically targeted core enterprise systems but as the defenses for those systems have matured, attackers now target the same information but in less secured unstructured (broadly speaking, file and email based) repositories.

An Alleged 22 Billion Mobile Money Fraud

As per the news reports published MTN’s Mobile Money Bank suffers N22B Fraud, Drags 18 Banks to court for recovery The newly licensed Mobile Money Payment Service Bank Limited (MOMO PSB) a banking subsidiary of MTN Communications Limited has in less than a month operation suffered a massive fraud worth over N22 billion on its network. The suspicious transfers were due to the fact that the MoMo PSB suffered system exploitation which led to the said debits.

What is Mobile Forensics? A Real Example From the SecurityScorecard Forensics Lab

Mobile forensics is recovering digital evidence from mobile devices using accepted methods. A lot of information can be discovered by analyzing a criminal’s phone. That’s why mobile forensics and digital forensics as a whole are becoming valuable assets for law enforcement and intelligence agencies worldwide. In 2021, there were 15 billion operating mobile devices worldwide. That’s nearly two per person. The amount of data stored across these devices is astounding.

8 Best Practices for Securing the Internet of Things (IoT)

While the Internet of Things (IoT) can provide helpful insights, it can also introduce a host of new security vulnerabilities into your organization. Without a clear understanding of the importance of IoT security, your organization will continue to introduce new vulnerabilities without even realizing it. Let’s take a closer look at how IoT security is important and the best practices your organization can use to improve the overall security of your organization.

The Future of Work Requires More Transparent Management

Most knowledge-economy workplaces are embracing the remote future of work. The question for these leaders is how to manage a workforce that may physically congregate in the office only once or twice a week, if ever. According to Gallup, as many as two-thirds of white-collar U.S. employees worked exclusively from home during the pandemic, a massive shift that will shape workplace culture for years to come.

Selecting SIEM Tools - Questions to Consider

So, you’ve done your homework. You’ve clearly defined business requirements, and you think you want to implement a Security Information and Event Management (SIEM) solution into your organization. Cloud migration and remote work have changed the way threat actors attack, and it feels like every day you read about a new methodology. While a lot of companies added a SIEM to their cybersecurity technology stack, you’re not sure whether you can afford one.

Evolution of Cybersecurity: From Prevention to XDR and SOAR

Since the early days of computing, cybersecurity has been a top concern for businesses and organizations. Over the years, the nature of cybersecurity threats has changed dramatically, and so too must our approach to security. In this blog post, we'll take a look at the evolution of cybersecurity from prevention to XDR and SOAR. We'll also consider the implications of these changes for CIOs and business leaders alike.