Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

April 2022

[Thoughtleadership webinar] The emerging cyber threat and attack trends of 2022 with Bryan Seely

Tune in to this webinar featuring ManageEngine product expert, Ganesh, and cybersecurity expert and ethical hacker, Bryan Seely, to understand the emerging cyber threat trends in 2022, and how organizations can stay on top of attacks with a solid PAM programme.

Protecting your Microsoft 365 services against NOBELIUM attacks [E-book]

In December 2020, Microsoft came forward with details regarding what is now being considered the most extensive, severe cyberattack in history—the NOBELIUM attack. This shocking security breach by NOBELIUM, a group of Russian hackers, brought the cybersecurity world to a standstill with its well-planned and well-executed hacking. It compromised several organizations through a supply chain attack.

Five worthy reads: Cybercrime and its impact on the economy

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about how a country and global economy is impacted when a cybercrime happens, how every citizen is victimized, and what governments are doing to mitigate this rising issue.

Endpoint management: A must-have for the financial sector

It’s almost that time of the year to file taxes in Portugal, so John opens the email he received asking him to submit his taxes. It’s from a bank he trusts, so he follows the instructions in the email and proceeds to download the attached PDF. Little did he know that when he clicked the links in the email body, the Lampion trojan was downloaded from an online server.

Getting the best out of your SIEM

An effective SIEM solution ingests logs from different network sources to give visibility into user and host activities. It uses capabilities such as threat intelligence and behavioral analysis to set correlation rules to spot malicious activities within a network. This e-book will help you obtain the maximum value from your SIEM deployment by guiding you through 10 of the most critical capabilities capabilities.

The New York Racing Association ensures a secure IT environment using AD360

Rabindra Mohan, technical operations manager at the NYRA, was tasked with improving his organization’s remote work capabilities. However, due to the inherent nature of the business, the IT team had to take a very hands-on approach to their operations. Mohan needed a solution that could be automated and deployed right out of the box. As part of the IT team’s broader vision, Mohan also wanted to manage the NYRA’s IT environment on the go from a mobile app.