Blog

manageengine

Shared iPads at work: How MDM helps you get the most out of them

Many organizations allow their corporate devices to be shared by different employees, or hand them out to teams or departments on a rotating basis. Healthcare providers, logistics companies, retailers, and schools often deploy mobile devices that are shared to ease the device management process, cut down on inventory costs, solve issues arising from workspace changes, and efficiently manage contract employees and students.

rezilion

Cybersecurity Awareness Month: 4 Ways to Tackle the Cybersecurity Skills Gap

The security skills gap continues to be a serious issue for organizations and there are no signs that things will get better soon. A June 2021 report by security professionals organization Information Systems Security Association (ISSA) and technology research firm Enterprise Strategy Group (ESG) finds the cybersecurity skills crisis continues on a downward, multi-year trend of bad to worse, and has impacted more than half of the 489 organizations surveyed.

Snyk

Securing S3 bucket configuration and access with Snyk & Solvo

Solvo is empowering developers and DevOps engineers by enabling them to run their cloud infrastructure with least privilege access, at speed and scale. In this article, we’ll go through a workflow combining Solvo’s automatic platform with Snyk Infrastructure as Code (Snyk IaC) to create customized and secured access from a Lambda function to an AWS S3 bucket. This blog was originally posted on the Solvo website.

upguard

6 Most Common Causes of Data Leaks in 2021

The trend of global data breach events is steep and still continuing to tilt upwards. According to the latest data breach investigation report by IBM and the Ponemon Institute, data breach costs in 2021 have reached a record high. Last year, the average cost was US$3.83 million, and this year it has peaked at US$4.24 million. Mitigating these events involves comprehensive management of the entire attack surface, including the third, and even fourth-party vendor network.

forgerock

Four Dilemmas of a Troubled Financial Services Consumer

I opened my first bank account 25 years ago. Stepping into financial independence filled me with excitement, but also anxiety about all that I had to learn. A lot has changed since then, from the digitization of banking to the introduction of privacy and payments regulations in many parts of the world.

SecurityScorecard

How to Identify and Classify High-Risk Third Parties

Today’s business landscape means having various business partners. From contractors to technology vendors, third parties are now part of everyone’s daily operations. However, with every new third-party you onboard, you also add a new risk. Supply chain attacks compromise your data, even if the third-party isn’t providing you a technology solution. To secure your data, you need to identify and classify high-risk third parties.

upguard

What is an Intrusion Detection System (IDS)? + Best IDS Tools

An intrusion detection system (IDS) is a software application or hardware device that detects vulnerability exploits, malicious activity, or policy violations. IDSs place sensors on network devices like firewalls, servers, and routers, or at a host level. Once the IDS detects any cyber threats, the system will either report this information to an administrator or a security information and event management (SIEM) system collects it centrally.

alienvault

Hands-on domain password policy setup for Active Directory

Dealing with the massive architecture of client-server networks requires effective security measures. Everyone has become painfully aware of all dangerous fishes roaming around the pool of the network, trying to get access to the system. Having a weak password policy is a key vector for attackers to gain system access. However, admins can help protect password security of the wide-reaching network using Group Management Policy (GPO).