Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 2020

The missing link to comprehensive endpoint security

Very few things available online are truly free of cost. If you don’t pay with cash, chances are you are paying with your personal information or other data. The Chrome web store is filled with free extensions that users install on their browsers to enhance their online experience. However, more and more of these extensions are being discovered and removed from the store due to their malicious intent.

CCPA compliance: Getting ready for enforcement

With enforcement of the California Consumer Privacy Act (CCPA) set for July 1, 2020, it is time for organizations to ensure their compliance strategy is in place. With the CCPA already in effect since January 2020, regulators expect the companies to be CCPA compliant now. The CCPA requires organizations to secure the sensitive data they hold, while also protecting the privacy of consumers.

Tackling password mismanagement woes of remote employees

Remote work is here to stay, at least for the time being. IT admins now face the stiff challenge of extending IT support to employees and ensuring smooth workflows. They are now forced to minimize help desk dependency and processes in place that ensure complete security. This e-book helps IT admins do exactly that. ManageEngine's in house IAM expert writes about accessibility and security aspects of password infrastructures, and how you as an IT admin can minimize the risk of employee down-time due to password mismanagement.

Five worthy reads: Privacy in pandemic management

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we explore the data privacy challenges and concerns that have arisen during the COVID-19 pandemic. In the wake of COVID-19, the world has witnessed the power of technology.

Why Zero Trust in IAM is the new way forward

The increasing adoption of cloud applications and an expanding remote workforce are redefining network security. In a traditional setting, the emphasis was on perimeter-based security—assuming that everything behind the corporate firewall is safe. However, it’s clear that organizations have to rethink the philosophy of implicit trust in a corporate network.

Curtail security exploits in applications and fortify your remote endpoints

The trend of working from home has hit the ground running, and businesses have turned to strategies and tools that will ensure a no-plummet productive environment. There are two major forks in the road when it comes to provisioning remote endpoints—users can use their own devices, or the company can hand over corporate-owned devices.

Securing Azure Active Directory from PowerShell abuse

Malware attacks are evolving and once common tactics are becoming a thing of the past. Attack strategies, like using a third-party hacking program or injecting viruses from external sources, are almost obsolete as they leave a distinct footprint. Most antimalware tools can now detect the presence of a foreign program or device and immediately block them.

Your return-to-the-office cybersecurity checklist

The novel COVID-19 pandemic has changed the way organizations work. The sudden transition to remote work has forced organizations to look for temporary fixes to bridge the gap, leaving their endpoints exposed to an unprecedented threat landscape. Insecure internet connections, a lack of perimeter security, and the inability to implement effective security policies have made remote endpoints a breeding ground for threat actors.