Log360
Principales tendencias tecnológicas estratégicas de Gartner para 2021
Las tendencias de este nuevo año se dividen en tres temas claves: centralidad en las personas, independencia de la ubicación y entrega resiliente. Esta es la conclusión del listado de tendencias estratégicas ...
5 padrões de comportamento do usuário que devemos prestar atenção em um espaço de trabalho descentralizado
Problema: Se você possui milhares de funcionários espalhados por vários de lugares, como pode manter a rede da sua organização segura? Solução: Você deve monitorar seus funcionários onde quer que estejam e desenvolver uma ...
IT security under attack blog series: Instant domain persistence by registering a rogue domain controller
In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain persistence in AD environments. Dubbed DCShadow, this ...
CybersecAsia Awards 2020 recognizes ManageEngine for its leadership in cybersecurity
ManageEngine’s Log360 was recently honored with the CybersecAsia Award for the Best User and Entity Behavior Analytics software application. The award certifies the important role, and the innovative technology brought to the table by ...
Como proteger sua infraestrutura de TI de uma ataque Maze ransomware
Ataques cibernéticos já são conhecidos e é um assunto frequente quando falamos sobre trabalho remoto e infraestruturas híbridas ou na nuvem. Os ataques de ransonware são muito frequentes e podem causar muitos ...
Is IT security under attack?
From credential theft to network vulnerability exploitation and ransomware incidents on highly secure organizations, the year 2020 has been surprisingly rough on IT security. In the wake of the COVID-19 pandemic, companies around the ...
Domain controller patch alert! Vulnerability grants domain admin access in 10 seconds
A critical Active Directory vulnerability (CVE-2020-1472) has been making headlines for being the most notorious elevation of privilege bug because it can affect all computers and domain controllers in an organization. This ...
Understanding how attackers move inside your organization
Cyberthreats have been coming at us from the left, right, and center. The number of cyberattacks is forever on the rise, and companies need to keep ramping up their security measures to protect ...
Why following NIST guidelines will strengthen your SIEM framework
The National Institute of Standards and Technology (NIST) is a federal, non-regulatory agency funded by the United States Department of Commerce. It aims to provide security guidelines, quality standards, and more for ...

