Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

To Be or Not to Be: BCSI in the Cloud?

With regard to BCSI (BES (Bulk Electric System) Cyber System Information) in the cloud, responsible entity sentiments at the moment may be akin to Prince Hamlet as he contemplated death and suicide, “bemoaning the pain and unfairness of life but acknowledging that the alternative might be worse.” As currently written and subject to enforcement, components of CIP-011-2 quite frankly make it near impossible to be compliant in designating a cloud-hosted BCSI repository much less actually choos

Women in Cyber - An Open Letter

The past sixteen years have witnessed a staggering growth in the cybersecurity industry. With a global market worth of $3.5 billion in 2004, this figure mushroomed to $120 billion in 2017. It is now predicted to surpass $1 trillion by 2021. Alongside this growth is the upsurge of demand for cybersecurity talent, of which there is a severe shortage with an expected 3.5 million unfilled positions in a year’s time.

ManageEngine named in Gartner's Magic Quadrant for Security Information and Event Management four years running!

The cybersecurity market is ever-changing and primarily driven by sophisticated cyberattacks, disruptive technological growth, and stringent data protection regulations like the GDPR and CCPA. We are constantly evolving our solutions to meet these dynamic market needs. We believe our recognition in the Gartner Magic Quadrant for security information and event management (SIEM) for the fourth consecutive time proves that our efforts have been channeled in the right direction.

Weekly Cyber Security News 06/03/2020

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. I have a great weird and wonderful selection for you this week. OK, I could have just opted for the usual major breaches and boy, don’t we have a few of those? No, instead some really odd geeky and perhaps quite pointless ones caught my attention. First is a look at air craft hacking.

How to spot a fake app?

This blog was written by an independent guest blogger. There are billions of mobile phone users in the world, and every day, the number increases as people find convenience in the use of smartphones. As the number of smartphone user increases, technologies, apps, and software are continually created for these devices. However, as people shift their use to mobile devices, so are cybercriminals. Hackers are now finding ways they can to target mobile phone users.

Launching Application Control Plus: Build an infallible stronghold against all application-related threats

We’re pleased to announce the debut of ManageEngine Application Control Plus, an application whitelisting, blacklisting, and privilege management solution. IT operations could come to a standstill if applications suddenly ceased to exist, but applications can be considered double-edged swords. As important as applications are, they also form the largest threat vectors in any network.

The War of Passwords: Compliance vs NIST

The most recent National Institute of Standards and Technology (NIST) guidelines have been updated for passwords in section 800-63B. The document no longer recommends combinations of capital letters, lower case letters, numbers and special characters. Yet most companies and systems still mandate these complexity requirements for passwords. What gives?