Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

JFrog detects malicious PyPI packages stealing credit cards and injecting code

Software package repositories are becoming a popular target for supply chain attacks. Recently, there has been news about malware attacks on popular repositories like npm, PyPI, and RubyGems. Developers are blindly trusting repositories and installing packages from these sources, assuming they are secure.

ManageEngine: MITRE ATT&CK training: Staying ahead of adversarial tactics

The MITRE ATT&CK framework is an extensive knowledgebase of tactics, techniques and procedures that an adversary might use to compromise an organization. This framework identifies 12 main tactics or technical goals that adversaries have, and each of these tactics are associated with multiple techniques. Techniques describe how tactics are accomplished. The framework also has a list of procedures that describe how specific techniques are implemented at the time of a compromise.

ManageEngine: Windows Security 101: Protecting business sensitive data with file system auditing

In today's technology driven work climate, employees require quick and simple access to company data. Unfortunately, this race to meet with productivity standards and growing employee needs is impacting the security and safety of business critical data. File servers in the typical Windows environments act as a shared space where all users with access rights can contribute and take data as per requirement. But, this is just one side of the coin. Sensitive data is often lost, accessed, and misused by unauthorized users, the access permissions to data are illegally modified, and the native tools that audit and monitor sensitive data changes are not up to the required standard.

ManageEngine: Improving Endpoint Security for Remote Workers through Unified Endpoint Management

By 2024, more than half of organizations will consolidate to a single console for endpoint management and security tasks, up from less than 5 percent in 2020. In this exclusive webinar, our featured speaker, Andrew Hewitt-the End User Computing Analyst at Forrester-will discuss how you can improve device security, across every endpoint, including servers, desktops, laptops, mobile phones, tablets, virtual machines, PoS machines and IoT, for remote workers through unified endpoint management (UEM).

ManageEngine endpoints and IT operations management seminar 2021

Many organizations migrated to a remote workforce model during the pandemic. While our recovery from the pandemic is ongoing, IT administrators are presented with a new challenge: managing their organization's endpoints and the IT operations for the remote and on-site workforce. The hybrid model is here to stay, and streamlining it is the next IT challenge. Are you prepared? Join us for this seminar to become better equipped to address the challenges of managing endpoints and IT operations in your organization.

ManageEngine: Evolution of privileged access management: Serving modern enterprises' expanding use cases

With digitalization continuing to grow popular in enterprises along with increasing interest in DevSecOps, cloud services, automation workflows, analytics, and other novel technologies, the focus of privileged access management (PAM) solutions has also shifted significantly. Today's PAM strategies go beyond just managing privileged user accounts and provisioning secure remote access. They extend to securing diverse digital identities; controlling who accesses what, for what purpose, and for how long; managing DevOps secrets; and proactively preventing privilege misuse.

ManageEngine: Make your IT operations future-proof with the Branch of One architecture

In the last year, we watched adoption of remote and hybrid work cultures accelerate around the globe in response to the pandemic. But most enterprises weren't ready for the abrupt change in where their workforces operated. Initially, IT admins deployed a number of band-aid solutions like VPNs to give their workforces seamless connectivity to their corporate networks. But these solutions had drawbacks of their own. To overcome the shortcomings of these band-aid solutions and deliver a seamless experience to their workforce, enterprises need to rethink their IT strategy.