Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

ManageEngine named as a Challenger again in the 2024 Gartner Magic Quadrant for Privileged Access Management

We are elated to announce that ManageEngine has again been recognized as a Challenger in the 2024 Gartner Magic Quadrant for Privileged Access Management. We believe that this is a testament to the consistency with which ManageEngine delivers a holistic experience for enterprise IT. The Gartner Magic Quadrant evaluated vendors on the basis of their Ability to Execute and their Completeness of Vision.

Redefining Security Investments: SAST Scans and DFPM

In today's ever-evolving digital landscape, teams must have a strong understanding of the security measures that will work best for their environment and how to implement them. During this event, we explore the benefits of utilizing SAST scans and DFPM (Data Flow Posture Management) tools to create robust security guardrails for your organization. Hear from Anirban Banerjee, CEO and Co-founder of Riscosity, and Milan Williams, Sr. Product Manager at Semgrep, as they dive into how teams can approach security investments starting with SAST scans and data flow security.

Securing AI and LLM: The Critical Role of Access Controls

As more companies leverage Artificial Intelligence (AI) and Large Language Models (LLMs) to maximize productivity and accelerate growth, the responsibility of safeguarding data has become increasingly critical. In this environment, robust access controls are not just a security measure but a fundamental aspect of responsible AI usage. This article will explore what access controls are, why they are essential for AI and LLM security, and how organizations can implement them effectively.

What is cyber resilience and how can my organization become cyber resilient?

There are a lot of fancy buzzwords in cybersecurity. One of this year’s most popular terms is Cyber Resilience but it is far from just a buzzword! In fact, The World Economic Forum agrees stating “Cyber resilience is more than just a buzzword in the security industry; it is an essential approach to safeguarding digital assets in an era where cyber threats are not a matter of IF but WHEN.”

Review of the Polyfill Supply Chain Attack - Lessons & Mitigation

In June 2024, the digital world was rocked by a significant supply chain attack involving Polyfill.io, a JavaScript library that had been a staple in web development for over a decade. Originally designed to ensure compatibility between older browsers and modern web APIs, Polyfill.io became a silent vulnerability when a Chinese company named “Fun Null” acquired the domain in February 2024.

Tackling the Unique Cybersecurity Challenges of Online Learning Platforms

Online learning has expanded access to education across all levels. However, as beneficial as these platforms can be, they pose unique cybersecurity risks. Securing e-learning platforms will become increasingly crucial as more school systems embrace this technology.

Password Length vs Complexity: Which Is More Important?

According to the National Institute of Standards and Technology (NIST), complex passwords that contain a variety of characters are strong, but the longer a password is, regardless of the types of characters, the more secure it is. Password length is generally more important than complexity because longer passwords are typically harder for cybercriminals to crack. That being said, you should also prioritize making your passwords complex for added security.