Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Teleport Demo - 30 Minute Overview

0:00 Intro

1:00 Architecture Overview

3:00 Single Sign On Integration

5:00 Teleport Server Access

7:00 tsh and session recordings

9:00 Teleport App Access

11:00 RBAC Mapping

12:05 Teleport K8s Access

15:00 Teleport DB Access

18:00 Teleport RDP Access

22:00 Access Requests

24:00 Teleport Slackbot

26:00 Active Session Joining
27:00: Trusted Clusters

28:00 Open Source vs Enterprise

Exploring Security and Observability on Splunk Lantern

Your organization purchased Splunk Cloud Platform some time ago. Your environment is ingesting dozens of data sources and your team has expert level SPL skills. You've created easily consumable dashboards and reports for many different types of stakeholders and you've mastered alert fatigue. Your organization's return on investment both in Splunk and Splunk education is paying large dividends in terms of time saved managing threats and improved operational efficiency.

Devo: Managing Your SOC in the Cloud

It's undeniable that shifting to the cloud can deliver a whole host of benefits to your organization. But questions about how to manage your data in the cloud can still arise. And once you've made the shift, how do you balance security and innovation priorities? And how do you modernize your SOC by leveraging the cloud? Learn from industry experts on these topics and more in Devo's upcoming webinar, How do you manage your SOC data in the cloud, on July 19th, 2022.

Entering the 7th month of 2022 with 7 prestigious Grand Globee awards

ManageEngine is the proud winner in seven categories of the Information Technology World Awards, the IT industry’s premiere excellence award program. We are honored to be recognized by the only complete IT recognition and achievement award program that covers all the facets of the IT industry. More than 170 judges consisting of industry experts in IT and cybersecurity from around the world were a part of the jury.

Tips for Managing Unstructured Data Security

All information is an attractive target for bad actors, but some is inherently more valuable than others. State-sponsored and hacktivist attacks constantly probe enterprise networks seeking to identify the location of sensitive information. Attackers historically targeted core enterprise systems but as the defenses for those systems have matured, attackers now target the same information but in less secured unstructured (broadly speaking, file and email based) repositories.

An Alleged 22 Billion Mobile Money Fraud

As per the news reports published MTN’s Mobile Money Bank suffers N22B Fraud, Drags 18 Banks to court for recovery The newly licensed Mobile Money Payment Service Bank Limited (MOMO PSB) a banking subsidiary of MTN Communications Limited has in less than a month operation suffered a massive fraud worth over N22 billion on its network. The suspicious transfers were due to the fact that the MoMo PSB suffered system exploitation which led to the said debits.

What is Mobile Forensics? A Real Example From the SecurityScorecard Forensics Lab

Mobile forensics is recovering digital evidence from mobile devices using accepted methods. A lot of information can be discovered by analyzing a criminal’s phone. That’s why mobile forensics and digital forensics as a whole are becoming valuable assets for law enforcement and intelligence agencies worldwide. In 2021, there were 15 billion operating mobile devices worldwide. That’s nearly two per person. The amount of data stored across these devices is astounding.

8 Best Practices for Securing the Internet of Things (IoT)

While the Internet of Things (IoT) can provide helpful insights, it can also introduce a host of new security vulnerabilities into your organization. Without a clear understanding of the importance of IoT security, your organization will continue to introduce new vulnerabilities without even realizing it. Let’s take a closer look at how IoT security is important and the best practices your organization can use to improve the overall security of your organization.