Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Top 2025 Network and Cybersecurity awards honor Firewall Analyzer

We are excited to announce that ManageEngine Firewall Analyzer has been recognized with multiple prestigious industry awards across the Cybersecurity and Network Security categories. These honors reflect the trust and confidence our users place in Firewall Analyzer as their go-to solution for firewall management, security visibility, and compliance reporting.

Top tips: Cyber hygiene habits you can build this week

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week, we’re breaking down the simple cyber hygiene habits that can make your digital life safer, calmer, and far easier to manage. If digital life had a skincare routine, most of us would be walking around with unwashed faces and expired sunscreen.

Introducing DDI Central 5.6: Anomaly-aware, forecast-driven, monitoring-powered, Cisco-Smart DDI for modern networks

When we shipped DDI Central 5.5, we brought STIX/TAXII-powered threat intelligence into your DDI stack—enabling you to detect and respond to known threats in real time, using globally curated indicators of compromise. That release turned DNS and DHCP into active players in enterprise security.

Top tips to keep your wearables from leaking your health data

Top tips is a weekly column where we break down what's shaping the tech landscape and share practical ways you can stay informed and protected. This week, we’re looking at why safeguarding the health data collected by wearables is just as important as tracking your fitness goals. Wearables don't just track steps and sleep, they collect some of the most intimate health information we have, including: heart rate, blood sugar, medication routines, stress levels, and sleep patterns.

Azure Key Vault and Application Secrets and Certificates with Key Manager Plus

Managing certificates and client secrets across multiple Azure Key Vaults and applications manually? It's not just time-consuming, it's nearly impossible to do effectively. That's where Key Manager Plus comes in. Its seamless Azure integration gives you complete visibility and control over every certificate and secret across your Azure Key Vault and registered applications, all from one centralized dashboard.

Five worthy reads: Identity fabric: Intertwining identities to create an impenetrable shield

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. In this week's edition, we will discuss how the concept of identity fabric has evolved and what it holds for the future. Securing digital identities is no longer a one-man show; it is everyone's game now.

Mastering cloud app control, Part 3: Governing file transfers

In Part 1 and Part 2 of the cloud app control blog series, we saw how SinaraTech, a mid-sized ecommerce company, used access control to block risky apps and login control to weed out unauthorized access to legit applications. But the danger wasn't over yet. The Security SOC team had one final piece that was missing from the cloud app control puzzle. Let's continue down the road to find that piece.

Device provisioning struggles due to M&As, high staff turnovers, and Epic go-lives

Two primary trends are reshaping the healthcare industry: First, healthcare experiences a high number of mergers and acquisitions (M&As), with affiliates frequently joining and exiting as contracts evolve. Second, staff turnover remains persistently high, largely driven by burnout among healthcare practitioners.

Cisco SNMP exploit targets IOS and IOS XE devices: What it means for your network

SNMP has always been one of the quiet but crucial components of network management. It helps administrators monitor devices, automate configurations, and keep operations running smoothly. On Sept. 24, 2025, Cisco disclosed a high-severity vulnerability, identified as CVE-2025-20352, affecting the SNMP implementation in its IOS and IOS XE software. This issue allows attackers with valid SNMP credentials to cause a denial of service or execute arbitrary code on the affected devices.