A critical Active Directory vulnerability (CVE-2020-1472) has been making headlines for being the most notorious elevation of privilege bug because it can affect all computers and domain controllers in an organization. This high-risk vulnerability, dubbed Zerologon, gives threat actors easy, instant access to domain controllers without requiring any additional privileges. This attack does not even […]
Dealing with data glut: Why ROT data is an issue, and how to manage it
“Unstructured data accounts for as much as 80 percent of an organization’s data footprint.” – Gartner As file storage grows rapidly year after year, new challenges arise around keeping data safe and maintaining control over data storage systems. Who owns which files? Whose files take up what volume of enterprise storage? Which files have become […]
6 top risk factors to triage vulnerabilities effectively
Common Vulnerability Scoring System (CVSS) scores have been viewed as the de facto measure to prioritize vulnerabilities. Vulnerabilities are assigned CVSS scores ranging from one to 10, with 10 being the most severe. However, they were never intended as a means of risk prioritization. If you’ve relied on CVSS scores alone to safeguard your organization, […]
New design, layout, and features—the all-new UI of ServiceDesk Plus Cloud is here
We are excited to launch the all new user interface for ServiceDesk Plus Cloud, the flagship ITSM software from ManageEngine. This latest UI update takes cues from the minimal design language and features restructured layouts that puts the user at the center of every module interaction. The new user experience is based on four dimensions: […]
October Patch Tuesday fixes 87 vulnerabilities, 6 of them publicly disclosed
October Patch Tuesday is here. While the next two weeks are going to be busy for system administrators as they hustle to test and deploy updates, once the cyberthreats are handled, we can all enjoy the fall festivities in peace. This Patch Tuesday has Microsoft releasing security fixes to address 87 vulnerabilities, out of which 12 […]
Five worthy reads: Every month should be Cybersecurity Awareness Month!
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. Organizations on a global scale observe Cybersecurity Awareness Month to educate and instruct their employees on cybersecurity best practices. This week we highlight some cybersecurity trends that are shaping the industry today. Now in its 17th […]
Microsoft Teams and OpManager: The perfect team for your remote IT management game
It seems almost everything is going digital during this pandemic: businesses, education, and medical consultations. This increased digital consumption is squeezing the juice out of the IT infrastructure of many organizations. On top of that, remote work policies are posing serious security issues. At times like these, IT infrastructure monitoring is like a football game […]
Five worthy reads: The evolving employee experience
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore how the employee experience is evolving with the new normal. The employee experience (EX) isn’t about ping pong tables or bring-your-pet-to-work days anymore. The new normal of working remotely has brought in […]
Are you listening to your logs? Part 4: Open Ports
Did you know that an organization with more open ports is more vulnerable to data breaches? In the first, second, and third parts of the Are you listening to your logs? series, we saw how logs can be used to detect security and operational issues in a network. In the final blog, we’ll talk about […]
Are you listening to your logs? Part 3: High disk usage
In the previous blog of this series, we saw how server crashes can be avoided by detecting low disk space in time using logs. In this blog, we’ll talk about another server metric, disk usage, and how it can be linked to cryptojacking. Unlike the percentage of used disk space, disk usage refers to the […]