Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How DDI Central's DNS security features help organizations build a stable, resilient DNS network

Most security investments focus on the perimeter, like firewalls, endpoint agents, and SIEM alerts. Yet one of the most abused channels in enterprise attacks barely gets a second look: DNS. Before malware is executed, before data is exfiltrated, and before a lateral movement attempt begins, DNS is involved. Attackers use it to find footholds, establish command-and-control (C2) channels, and quietly map internal infrastructure.

DNS anomaly detection with machine learning: How ManageEngine DDI Central stops threats before they start

Most breaches don't announce themselves; they whisper. A subtly malformed DNS query here. A DHCP lease request that looks almost normal there. A client that suddenly requests a domain no one in your organization has ever heard of. By the time these whispers become alarms on a SIEM dashboard, attackers have often already moved laterally, exfiltrated data, or cemented persistence. In traditional DNS, DHCP, and IPAM (DDI) setups, these signals are buried under millions of legitimate transactions.

How ADAudit Plus eliminates auditing blind spots and provides granular visibility into your AD environment

Active Directory (AD) auditing focuses on topics such as who did what, when, and from where within your network. AD auditing and SIEM monitoring are closely related, yet they play two distinct roles in cybersecurity. SIEM monitoring shows you how a change is connected to an attack or incident. Together, they enable faster investigations, accurate root-cause analysis, and a stronger security posture.

ManageEngine Key Manager Plus Cloud: An overview

ManageEngine Key Manager Plus Cloud is a cloud-based comprehensive certificate life cycle management solution that helps consolidate, control, audit and automate the entire life cycle of enterprise TLS and SSL certificates. In addition, Key Manager Plus also offers end-to-end Azure Key Vault and application secrets management, and PGP key management. This demo will cover all the key features of Key Manager Plus Cloud.

What major cyberattacks reveal about the cost of slow recovery

Cyberattacks often succeed not because they are sophisticated but because organizations lack reliable backups or struggle to restore data quickly. When recovery is slow, even minor disruptions can escalate, providing attackers with the time and leverage they need to deploy ransomware and halt operations. When systems go down, every minute of downtime results in operational disruption, a drop in revenue, and lost customer trust.

Episode 29: When AI becomes a security problem ft. Tamaghna Basu

AI has quietly moved from experiments to real-world systems that now write, decide, and reason alongside us. But as these systems scale, so do the risks. From hallucinations and data leakage to prompt injection and model abuse. In this episode of Server Room, we sit down with Tamaghna Basu, Founder of DeTaSECURE, to explore what it really takes to build and secure AI systems in production and why the future of AI will depend not just on intelligence, but on trust.

Top tips to stop hackers from exploiting your office printers

Top tips is a weekly column where we highlight what’s trending in the tech world and list practical ways to explore these trends. This week, we are tackling a lesser-known but growing cybersecurity risk in modern workplaces: printer-based attacks. Let's start with a simple scenario. It's a quiet evening at the office. Most employees have gone home, the lights are dimmed, and the network continues running as usual. In one corner of the floor sits a printer that has been there for years.

The NotPetya attack: What it teaches us about cyber survival

In June 2017, the world witnessed one of the most destructive cyberattacks in history: the NotPetya attack. Unlike traditional ransomware, NotPetya was a wiper. Once it infected a system, recovery was impossible. The ransom demand was a ruse because no decryption keys were ever made available. The true intent of the attackers was to cause disruption and damage. Nearly a decade later, NotPetya is considered a turning point in how organizations approach backup and recovery. The threat has only grown.