Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Deploying Applications to a Kubernetes Cluster to Which You Don't Have Access

For the impatient, in this blog post, we’ll look into the problem of preparing a Kubernetes application to be deployed into a large number of Kubernetes clusters, even if you, the developer, do not have direct access to them all. The tutorial parts of this post will utilize Gravity 7.0, which you can download here. This version is in beta at the time of publication, so be sure to select pre-releases in the dropdown on the download page to access it.

We Want You! Win the War on Ransomware Today

Arguably, the first malware extortion attack occurred in 1988 – the AIDS Trojan had the potential to be the first example of ransomware, but due to a design flaw, the victims didn’t end up actually having to pay up the 189 bucks. It’s safe to say that over the past 31 years, attackers have perfected the ransomware craft, with organizations shelling out more than $25 billion per year. We don’t expect it to end any time soon.

What is Cyber Hygiene and Why is it Important?

Cyber hygiene is the cybersecurity equivalent to the concept of personal hygiene in public health literature. The European Union's Agency for Network and Information Security (ENISA) states that "cyber hygiene should be viewed in the same manner as personal hygiene and, once properly integrated into an organization will be simple daily routines, good behaviors, and occasional checkups to make sure the organization's online health is in optimum condition".

Our award-winning IAM and insider threat prevention solutions highlighted at RSA Conference 2020

ManageEngine brought home its first set of accolades for 2020: two InfoSec Awards presented by Cyber Defense Magazine at RSA Conference 2020. Amidst the over 3,000 cyberdefense innovators that were assessed by Cyber Defense Magazine for its 2020 InfoSec Awards, ManageEngine was recognized for its identity and access management (IAM) offering, AD360, and for its insider threat prevention in Log360.

Top Cybersecurity Threats in 2020

Last year was a disaster in terms of the number of data breaches. A study produced by the nonprofit Identity Theft Resource Center rounded up 1,473 reported data breaches by the end of 2019 – a staggering 17% more than 2018. While the analysis notes that the actual number of data exposed were considerably less than 2018, it’s still proof of the increasing insecurity of deployed IT systems.

The rising threat of drones to cybersecurity: What you need to know

The Federal Aviation Administration (FAA) reports that there are nearly 1.5 million registered drones in the United States, proving them to be ubiquitous across the country - and there are plenty that are still unregistered, too. From military use to consumers who buy them to start a new hobby, drones are now used in many aspects of today’s society. Even Amazon plans on making drones part of their shipping process at some point in the future.

4 Best Practices for Security Operations Center Success

The security operations center (SOC) plays a critical role in an enterprise organization’s efforts to protect their data from rapidly evolving cybersecurity threats. However, for a variety of reasons revealed in this report by the Ponemon Institute—based on a survey sponsored by Devo of more than 500 IT and security practitioners—organizations are frustrated with their SOC’s lack of effectiveness in performing its vital work.

Monitoring a Mobile Workforce

With recent worldwide epidemic scares, many companies are asking their employees to work from home as much as possible. Statistics show that even without an imminent threat from illnesses like the coronavirus, companies would do well to prepare for the ever-increasing proportion of employees who work remotely. According to an analysis by Flexjobs and Global Workplace Analytics, there has been a significant upward trend in the number of people who now work remotely in the United States.

To Be or Not to Be: BCSI in the Cloud?

With regard to BCSI (BES (Bulk Electric System) Cyber System Information) in the cloud, responsible entity sentiments at the moment may be akin to Prince Hamlet as he contemplated death and suicide, “bemoaning the pain and unfairness of life but acknowledging that the alternative might be worse.” As currently written and subject to enforcement, components of CIP-011-2 quite frankly make it near impossible to be compliant in designating a cloud-hosted BCSI repository much less actually choos