Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How Phishing works

Social engineering is the art of manipulating people so that they give up confidential information or perform an action you ask them to do. Social engineers are usually trying to trick victims into giving them their credentials, bank information or access to computers to secretly install malicious software. Find out how phishing actually works and what you can do to reduce the risk.

Be enterprise-ready: Three reasons not to build enterprise features!

If you are thinking about building features to be enterprise-ready, there are typically two paths that brought you here: Either way, you need to be aware that selling to enterprises is super exciting, especially if you like to play golf and you are ok with a long sales cycle - it could easily take you up to three years to close a deal. Enterprises can be scared to give startups a chance and startups often lose out to more established businesses.

Sponsored Post

The Beginning of Ransomware

Ransomware's ascent from a minor crime to a multi-billion-dollar industry shows the seriousness of the danger to corporations. But even though Ransomware has been making the news regularly for the past five years, it is not new to hold user data or systems hostage and then demand a payment to get them back. This article will look at the evolution of ransomware, from its first known attack in 1989 to the vicious threat it has become in the present.

Locking PDF files to prevent theft

If you don't want anyone to steal or add to the classified contents in your PDF files then you need to adequately protect them. There are several reasons why you need to make sure that sensitive data in PDF files is protected. But at the same time, since the PDF format is a commonly shared document, it must be easily accessible to your users or those who read and review them. In the absence of PDF file security, you may be faced with severe consequences of a data breach. Hence, locking PDF files with right document security solution can effectively keep sensitive information within the files secured.

We did it again! ManageEngine AD360 and Log360 are among the 100 named in the 2022 Fortress Cyber Security Awards

We are excited to announce that ManageEngine has been recognized in three different categories by the Business Intelligence Group in its 2022 Fortress Cyber Security Awards. It is a moment of pride for us to see two of our solutions, AD360 and Log360, win more awards. AD360 was declared a winner in the Authentication and Identity category, and Log360 won awards in both the Threat Detection and the Incident Response categories.

OWASP Top Ten: Insecure Design

OWASP Top Ten: Insecure Design A new addition to the OWASP Top Ten, Insecure design is one of the leading causes of data breaches today. By understanding and avoiding these patterns, you can make your Web Applications more secure. In this blog post, we will give you a brief overview of Insecure Design and provide tips on how to avoid this vulnerability in your own applications.

Best Practices for Kubernetes Security

Kubernetes (K8s) and its expansive ecosystem of cloud-native technologies have revolutionized the way applications are built and run. While the adoption of Kubernetes has opened the door to big gains in business agility, scalability and efficiency, it also introduces complex new security challenges that affect platform engineers and developers alike.

Automating issue tracking in Zendesk using Google and Tines Forms

Google Forms is a useful tool for submitting tickets and generating issue tracking within your organization. Configuring a webhook in Google products isn’t always easy and the data must typically pass through a Google Sheet. In this blog, we’ll show you how to cut out that middle step and automate issue tracking, so that newly submitted cases can be transferred directly from Google Forms to Zendesk.

10 React security best practices

The date on this post reflects its latest update. This post was originally published on October 28, 2020. Looking for the best ways to secure your React app? Then you’ve come to the right place! We’ve created this checklist of React security best practices to help you and your team find and fix security issues in your React applications. We’ll also show you how to automatically test your React code for security-related issues and automatically fix them. Let’s get to it!

Examples of Ransomware: 7 Cyber Security Trends To Fight Back

Cybersecurity threats continue to increase in sophistication and frequency. As a CIO, it is important to be aware of the latest trends and how to best protect your organization from these threats. Here are seven cybersecurity trends and ransomware attack examples that you should make sure to keep top of mind in 2022.