The journey to a thousand IT problems begins with a single compliance lapse. Yes, this is the first time you are hearing it! So, tell us how often you’ve walked straight into trouble because you underestimated the importance of compliance
Combat Advanced Cyber Attacks With Shared Security Intelligence
(Originally published in Cyber Defense Magazine , Black Hat special edition) In this information age, even the mightiest of enterprises and governments across the globe are worried about cyber-attacks. Not a single day passes by without a story about a hack or a compromise or an identity theft involving data related to a large number of users. Cyber security is increasingly becoming complex, and cyber-attacks have truly emerged a global crisis.
ManageEngine’s EventLog Analyzer Advances the Cloud with ActiveState Stackato
The cloud, once known as the future of IT, is now part of modern IT infrastructure. With the growing acceptance of BYOD and employees soliciting critical business-service access on the move, the cloud is ideally suited to balancing these current market trends
ManageEngine EventLog Analyzer Secures Golden Award
EventLog Analyzer grabs windowssecurity.com golden award We are excited to announce that ManageEngine EventLog Analyzer recently took home the Golden Award from WindowsSecurity.com . Deb Shinder, MVP (Enterprise Security) reviewed the product before bestowing this award. We want to thank WindowsSecurity.com for giving us an opportunity to have our product thoroughly reviewed by Shinder, a seasoned security professional
Spate of shocking cyber attacks on universities jolt academia
It is hauntingly clear – cyber criminals have set their eyes firmly on universities, research institutions, and centers of higher learning in the United States and other parts of the world. If the cyber attacks of the past few weeks are any indication, universities are now facing the biggest threat to information security
Your Net Worth Is Online – And Less Safe Than Ever
The Black Hat USA 2013 conference, which kicks off tomorrow in Las Vegas, brings together the brightest minds in IT security each year — those who are responsible for perpetrating and protecting against the latest hacks and vulnerabilities. And not a second too soon, since every week seems to usher in another security catastrophe. This week’s shocker was the outing of a hole in mobile device SIM cards, by Karsten Nohl, the founder of Security Research Labs in Berlin
Security Gaffes You Might Have Missed So Far This Year
If you can believe it, 2013 is already halfway over. With summer here, businesses everywhere are feeling the heat in their IT organizations – as they fight a growing array of security concerns, threatening their profitability and reputation alike.
This Week’s Five: Security Begins At Home
This Week’s Five is a weekly column of five interesting reads from all over the web, with a different topic every week. This week, we explore the risks of security breach and importance of data protection in enterprise networks. Cyber thieves of all kinds have made the lives of the people in charge of data security miserable; except when they get caught.
If Big Data’s too scary, try Little Data (it’s free)
Here are some stats that will blow your mind: Every minute of every day, 48 hours of video content is uploaded to YouTube, Google receives over 2 million queries, over 100,000 tweets are sent and nearly 600 new websites are created. Perhaps most shocking is that quietly in the background, all of this data is tracked and stored. But what happens to it after that?
How to Automate Log Management? [Video]
Spend 2 minutes to see how our Security Information and Event Management (SIEM) software automates log management and helps you to mitigate internal threats, conduct log forensics analysis, meet regulatory compliance requirements and more. Product Page | Free Download | Testimonials | Awards The post How to Automate Log Management