Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Regaining control after identity theft: A step-by-step guide

Identity theft is no longer a singular occurrence but now one of the most dangerous and disruptive online risks that affect an escalating number of people worldwide. Whether your identity is used to obtain loans, make purchases, or complete official procedures, underlying each case of theft is the painful truth that your personal information is in the hands of a stranger.

How does DDI Central assist in onboarding and managing Cisco DHCP routers within a network?

DDI Central now offers the ability to onboard an organization’s Cisco routers into the application, giving network administrators hands-on control over router configurations and resources. It also enables centralized monitoring of all DHCP leases across the router’s pool ranges. Administrators can add and manage DHCP pool ranges for both DHCPv4 and DHCPv6.

Top tips: Secure your devices before you disconnect for the holidays

Top tips is a weekly column where we highlight what’s trending in the tech world and share ways to stay ahead. This week, as the holiday season rolls in and many of us finally take that much-needed break, let’s talk about something equally important: Stepping away from work safely. The holidays are all about resting–logging off and soaking in all the merry feelings. But to truly switch into that much-needed DND mode, it helps to secure your devices before you head out for the holidays.

Top 2025 Network and Cybersecurity awards honor Firewall Analyzer

We are excited to announce that ManageEngine Firewall Analyzer has been recognized with multiple prestigious industry awards across the Cybersecurity and Network Security categories. These honors reflect the trust and confidence our users place in Firewall Analyzer as their go-to solution for firewall management, security visibility, and compliance reporting.

Top tips: Cyber hygiene habits you can build this week

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week, we’re breaking down the simple cyber hygiene habits that can make your digital life safer, calmer, and far easier to manage. If digital life had a skincare routine, most of us would be walking around with unwashed faces and expired sunscreen.

Introducing DDI Central 5.6: Anomaly-aware, forecast-driven, monitoring-powered, Cisco-Smart DDI for modern networks

When we shipped DDI Central 5.5, we brought STIX/TAXII-powered threat intelligence into your DDI stack—enabling you to detect and respond to known threats in real time, using globally curated indicators of compromise. That release turned DNS and DHCP into active players in enterprise security.

Top tips to keep your wearables from leaking your health data

Top tips is a weekly column where we break down what's shaping the tech landscape and share practical ways you can stay informed and protected. This week, we’re looking at why safeguarding the health data collected by wearables is just as important as tracking your fitness goals. Wearables don't just track steps and sleep, they collect some of the most intimate health information we have, including: heart rate, blood sugar, medication routines, stress levels, and sleep patterns.

Five worthy reads: Identity fabric: Intertwining identities to create an impenetrable shield

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. In this week's edition, we will discuss how the concept of identity fabric has evolved and what it holds for the future. Securing digital identities is no longer a one-man show; it is everyone's game now.

Mastering cloud app control, Part 3: Governing file transfers

In Part 1 and Part 2 of the cloud app control blog series, we saw how SinaraTech, a mid-sized ecommerce company, used access control to block risky apps and login control to weed out unauthorized access to legit applications. But the danger wasn't over yet. The Security SOC team had one final piece that was missing from the cloud app control puzzle. Let's continue down the road to find that piece.

Device provisioning struggles due to M&As, high staff turnovers, and Epic go-lives

Two primary trends are reshaping the healthcare industry: First, healthcare experiences a high number of mergers and acquisitions (M&As), with affiliates frequently joining and exiting as contracts evolve. Second, staff turnover remains persistently high, largely driven by burnout among healthcare practitioners.