ManageEngine recognized in 2021 Gartner Magic Quadrant for Security Information and Event Management for the fifth time!

Today, we’re excited to announce that ManageEngine has been recognized in 2021 Gartner Magic Quadrant for security information and event management (SIEM) for the fifth consecutive time. We are thrilled to be awarded this recognition yet again for our… Continue reading ManageEngine recognized in 2021 Gartner Magic Quadrant for Security Information and Event Management for the fifth time!

New Survey: IT and Security leaders want more IT Freedom for employees, but also stricter IT Security

In one of the first major surveys of IT and Security professionals since the Covid19 pandemic, Hysolate together with independent global survey organisation Global Surveyz interviewed 200 IT and Security leaders at top US and UK companies with 500-10,0… Continue reading New Survey: IT and Security leaders want more IT Freedom for employees, but also stricter IT Security

JumpCloud Survey: Remote Work Taking a Security Toll

A survey of 400 IT professionals from small to medium enterprises published this week found three quarters of respondents concluded remote work makes it harder for employees to follow good security practices, with two-thirds (66%) admitting they are o… Continue reading JumpCloud Survey: Remote Work Taking a Security Toll

CLOP ransomware suspects charged by police in Ukraine

Six people alleged to be part of the notorious CLOP ransomware gang have been detained and charged by Ukrainian police, following nearly two dozen raids across the country. According to a statement released by the Ukraine’s cyber police, the hacking gr… Continue reading CLOP ransomware suspects charged by police in Ukraine

Building a complete network security checklist

Understanding what to audit in a network can be chaotic and confusing. Building a complete network security checklist is crucial for organizations with computers connected to the internet or to each other. Think of it like an antivirus scan you …
The p… Continue reading Building a complete network security checklist

Security threats affecting your workforce productivity? Here’s how Forrester says you can address them

According to Forrester, the number of permanent, full-time remote workers is expected to increase by 300 percent or more compared to pre-pandemic numbers. Amid the chaos surrounding the pandemic, getting your entire workforce back to the office seems … Continue reading Security threats affecting your workforce productivity? Here’s how Forrester says you can address them

Endpoint Management and Its Evolving Role in IT

Technology is changing rapidly and IT teams need IT management tools that are keeping up with this pace of change. Traditional endpoint managementRead More
The post Endpoint Management and Its Evolving Role in IT appeared first on Kaseya.
The post End… Continue reading Endpoint Management and Its Evolving Role in IT

Azure security 101: Security essentials, logs, authentication, and more

“Where necessity speaks, it demands”. This old saying seems particularly apt right now with the pandemic forcing organizations to completely change the way they think about their IT networks. That rapid shift to remote work has resulted in a …
The post… Continue reading Azure security 101: Security essentials, logs, authentication, and more

The Deepfake Dilemma, Microsoft Exchange Zero-Days, IT Security Investments

Deepfake video and audio has really advanced in recent years. Will this technology start to erode trust in the media we consume? Microsoft Exchange zero-days in the wild, and why is it that IT security investment on cybersecurity is at an all time high… Continue reading The Deepfake Dilemma, Microsoft Exchange Zero-Days, IT Security Investments

Security operations center, Part 3: Finding your weakest link

Any organization with data assets is a possible target for an attacker. Hackers use various forms of advanced cyberattack techniques to obtain valuable company data; in fact, a study by the University of Maryland showed that a cyberattack takes place …… Continue reading Security operations center, Part 3: Finding your weakest link