Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Navigating the cyber battleground: The vital role of network security policy management

The landscape of cyberthreats is continuously evolving, and to keep pace organizations employ robust network security strategies. This involves creating, executing, and maintaining a set of guidelines, or network security policies, on how the organization’s network should be protected from external threats. This process is termed network security policy management (NSPM) and it’s instrumental in maintaining the integrity of the network.

Windows Defender Firewall misconfigurations and GPOs: Connecting the dots

Many enterprises have a variety of aspects that make up their networks, like Windows Defender Firewall, GPOs, and an AD infrastructure. Vulnerabilities in any part of the network can have a domino effect; once the first domino falls, the entire trail will go down with it, which can cause irrevocable damage to your network.

Top tips: Three ways to defend your critical IT infrastructure against ransomware

Top tips is a weekly column where we highlight what’s trending in the tech world today and list out ways to explore these trends. This week we’re looking at five ways you can protect your IT infrastructure against ransomware attacks. Every year, the month of October is observed as Cybersecurity Awareness Month. This year, we wanted to dedicate a special entry in our top tips column to one of the fastest-growing digital economies in the world: the Middle East.

ManageEngine PAM360 now automates privileged access routines for over 800 enterprise apps-powered by Zoho Flow!

We are delighted to announce that ManageEngine PAM360 will now utilize Zoho Flow’s extensive product gallery to automate privileged access security workflows for more than 850 business applications and enterprise IT management tools.

PAM360 Zero Trust Overview

ManageEngine PAM360 delivers Zero Trust by design through three key principles—always verify, assume breach, and least privilege access. PAM360 helps you adopt a holistic, Zero Trust approach to privileged access management. From role-based access controls to dynamic trust scoring, PAM360 provides cutting-edge security features out of the box. Best of all, this comprehensive solution is easy to setup, implement, and manage.

Learning about Saudi Arabia's Personal Data Protection Law and the compliance solution

The Saudi Data and Artificial Intelligence Authority (SDAIA) has decided its’ about time to call for the Kingdom of Saudi Arabia’s first data protection law. The Personal Data Protection Law (PDPL), originally included a public consultation component when it was launched by SDAIA in late 2022. Since then, the public consultation was withdrawn, and the draft version of the data protection law augmenting PDPL was issued.

Dwi Wibowo, from Kopi Kenangan explains why he strongly recommends Endpoint Central to businesses.

Kopi Kenangan, a leading Indonesian food and beverage company, has been a customer since 2021. The company was looking for a solution to improve its asset management and the maintenance and monitoring of patches. IT specialist Diwi Wibowo fills us on the convenience of using the product and he strongly recommends it to other businesses.

Top tips: Five ways to prevent a cybersecurity disaster

Top tips is a weekly column where we highlight what’s trending in the tech world today and list out ways to explore these trends. This week we’re looking at five steps every organization should take to prevent cyberattacks and keep their data secure. The recent ransomware attacks on MGM Resorts in Las Vegas and Marriott Hotels have shown that we must be better prepared to identify and prevent phishing attacks.