Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Release 875: New Mac Features, Enhanced Monitoring, and Granular Data Mapping

This release delivers heavy-hitting updates to the Mac Agent, extends Windows monitoring into native desktop applications like WhatsApp, and provides administrators with more granular tools to manage data and triage security alerts. Here is a summary of the new features and improvements available in this release.

DNS anomaly detection with machine learning: How ManageEngine DDI Central stops threats before they start

Most breaches don't announce themselves; they whisper. A subtly malformed DNS query here. A DHCP lease request that looks almost normal there. A client that suddenly requests a domain no one in your organization has ever heard of. By the time these whispers become alarms on a SIEM dashboard, attackers have often already moved laterally, exfiltrated data, or cemented persistence. In traditional DNS, DHCP, and IPAM (DDI) setups, these signals are buried under millions of legitimate transactions.

Monitoring vs. Prevention: Why Your IRM Tool Needs to Do Both

Insider risk management (IRM) is the practice of identifying, assessing, and responding to data security threats that originate from people inside an organization, including employees, contractors, and partners. Modern IRM programs combine behavioral analytics, data visibility, and policy enforcement to detect risky activity before sensitive data leaves the organization. The operative word in that definition is "before." Most security teams assume their IRM tool does this. However, many are wrong.

An Introduction to the NIST Risk Management Framework (RMF)

While inherently critical to today’s businesses that run on data, implementing and enforcing data security and privacy has never been straightforward. Between collecting different types of sensitive data and deploying unique architectures, organizations cannot adopt a one-size-fits-all solution, meaning that every security architecture is unique.

SecurityScorecard Weekly Brief: The Cyber Risk and Policy Edition - Amanda Smith

In this week’s Weekly Brief: The Cyber Risk and Policy Edition, SecurityScorecard’s Director, Public Sector Channel Amanda Smith breaks down why the U.S. war with Iran is more than just what takes place on the physical battlefront. In 2026, as conflict unfolds in the Middle East, the digital battlefield has a direct impact on the homeland and U.S. critical infrastructure, too. “It's a global digital confrontation that hits a lot closer to home than a lot of people realize.”

FedRAMP's June 2026 Rule Overhaul: CR26 Explained

The first quarter of 2026 is behind us, and that means the next wave of rules, program phases, and other shifts in governmental policy are starting to take effect. One that you may have seen mentioned coming soon is the Consolidated Rules update. What is CR26, when does it take effect, and what does it do? We’ve been eyeing this update for months now, because it makes some very exciting changes, so let’s go through it and see how it will affect the FedRAMP process.