Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

FBI Warns of Cybercriminals Using Generative AI to Launch Phishing Attacks

The US Federal Bureau of Investigation (FBI) warns that threat actors are increasingly using generative AI to increase the persuasiveness of social engineering attacks. Criminals are using these tools to generate convincing text, images, and voice audio to impersonate individuals and companies. “Generative AI reduces the time and effort criminals must expend to deceive their targets,” the FBI says.

A Comprehensive Look at Automated User Account Options and Practices

Each individual in your organization needs a user account to access data, applications, servers, cloud services and other resources. If you have just a few accounts, you may be able to create, secure and govern them throughout their lifecycle using manual processes. However, manual processes are highly prone to human errors and do not scale to meet the needs of any but the smallest businesses. Instead, most organizations need automated user management tools.

Cybersecurity Content Creation Guide

Every cybersecurity vendor today depends, to some extent, on content marketing to get leads across various channels. "Content" refers to blog posts, ebooks, whitepapers, case studies, explainer videos, LinkedIn posts, etc. Basically, any marketing asset that carries a brand's product message to buyers in a way that they (should) find engaging. Almost every B2B company uses content marketing, but cybersecurity companies spend considerable effort on content because.

Renewtech's Network Configurator: Secure, Custom, and Cost-Effective Networking

Renewtech's network configurator empowers businesses to build secure, tailored and cost-effective network solutions using refurbished equipment from trusted brands like Cisco and HPE. Combining high quality, seamless compatibility and eco-friendly practices, it's the ideal tool for modern IT infrastructure.

Crypto trading journals: What are they, and how can they help you?

The trading journal is a very underrated tool in the crypto trading landscape, but the truth is that it can come in handy when navigating such a complex market. Relying on instinct is never enough when investing in cryptocurrencies, and every smart trader knows the importance of having a system in place that allows them to take opportunities when they arise and make proper decisions. A trading journal is an essential part of this system, allowing traders to keep a record of their performance and refine their strategies accordingly, as it captures everything from the trading patterns to the wins and the setbacks.

What is OAuth configuration, and how can it be implemented on mail servers using DDI Central?

ManageEngine DDI Central now facilitates Open Authorization (OAuth), which can be configured with your organization’s SMTP servers for implementing secure, reliable mail authentication for clients. OAuth provides credential-less authentication for accessing SMTP servers to send emails efficiently. It benefits users in a safe, secure approach to permitting third-party applications to access users’ SMTP servers without using their credentials.

Top tips: 4 ways to secure your operational technology infrastructure against security threats

Top tips is a weekly column where we highlight what’s trending in the tech world and list ways to explore these trends. This week, we explore four ways organizations can secure their OT environment. Operational technology (OT) has evolved from largely manual processes to digital, automated, and data-driven processes in recent years. As more industrial processes go digital, organizations in this sector now face a vastly expanded attack surface.

User Activity Monitoring: Unlocking Productivity for Remote and On-site Workforces

Whether managing a distributed workforce, balancing a range of devices and systems, or navigating the complexities of hybrid work, challenges are everywhere: fragmented workflows, operational inefficiencies, and concerns about insider risks. Solving these issues can feel like an uphill battle without clear visibility into digital workforce behavior.

How SASE Helps Address IT Burnout and Reduce Operational Risks

In today’s fast-paced business environment, IT teams are under increasing pressure to keep networks running smoothly and securely. The burden of managing a growing number of endpoints, networks, and cloud services—combined with constant threats of cyberattacks—can lead to IT burnout. Burnout affects the well-being of IT professionals and increases the likelihood of human error, such as misconfigurations, missed patches, and slow response times to incidents.