Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

A Zero Trust approach to identity security

Zero Trust is the term for an evolving set of cybersecurity paradigms that moves an organization’s defensive measures from static, network-based perimeters to instead focus on users, assets, and resources. It is a security mindset where every incoming connection is treated as a potentially malicious request until explicitly verified. This concept was introduced by John Kindervag, one of the world’s foremost cybersecurity experts, and emphasizes three principles.

How to improve the employee experience while ensuring identity security

Employees in the post-lockdown world have bid goodbye to traditional work environments. Remote and hybrid work is the new normal, with employees expecting full access to their work resources even when working remotely. They might also use multiple devices, even personal ones, to access corporate data.

How not to become a corporate account takeover victim 101

Account takeover is an attack where cybercriminals take ownership of user accounts using stolen credentials. It is essentially an identity theft fraud where the hacker, who now has full control over the user’s account, performs malicious activities posing as the real user. These malicious activities might include sending out phishing emails or messages, stealing and misusing sensitive financial or personal information, or using stolen information to takeover more user accounts.

Password attacks: How to combat them

“Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months.” – Clifford Stoll, Astronomer and engineer This identity security week, it’s important to understand the importance of passwords in cybersecurity, how easily they can be compromised if you are not careful, and how ManageEngine ADSelfService Plus helps fortify your passwords and enhance your organizational security.

Fostering an effective and secure remote-work model

An IDSA study found that 79% of enterprises have suffered an identity-related breach. At ManageEngine, we understand how important identities are to the overall security posture of an organization. That’s why this Identity Security Week, we’re offering a series of blogs to spread awareness about the importance of identity security and what simple measures can help improve the security of your organization. Let’s kick off the series with a trending topic—remote work.

Discover how to utilize essential User Logon reports from ADAudit Plus: Logon Failures

ManageEngine ADAudit Plus is a real-time change auditing and reporting software that fortifies your Active Directory (AD) security infrastructure. With over 250 built-in reports, it provides you with granular insights into what’s happening within your AD, such as all the changes made to objects and their attributes. This can include changes to users, computers, groups, network shares, and more.

The ultimate price: The morality of paying your attacker their ransom

“Have you backed up your files?” If you had a Dirham for every time you heard this and followed up with immediate action, you’d be a Shiekh by now. But alas, we’re here because you didn’t do your due diligence and now you have to pay the ultimate price—your data has been compromised and you’ll have to decide what to do about it. But don’t feel too bad; data backup at a corporate level is a luxury not everyone gets to enjoy.

Sponsored Post

Linux security: How the third-most-used OS in the world has become the number one target of cyberattacks

If we were to ask a bunch of people to choose a computer, they would most likely go with a Windows or Mac machine. The possibility of them choosing a Linux machine is slim. This is directly reflected in recent desktop adoption trends as well. Linux accounts for only 2.14% of all desktop operating systems (OSs) while its counterparts, Windows and Mac, occupy about 75.23% and 15.86% respectively.