Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

What is SIEM?

The impact of the colossal Starwood Hotels & Resorts data breach continues to reverberate across the global technology community. In its wake, the importance of log management and security information event management (SIEM) systems has once again come to the forefront. Let’s explore what SIEM is, the many acronyms emerging in the SIEM space and where logging fits into the picture.

2018: A look back at what we've done in ITOM

2018 was a busy year for the ManageEngine IT operations management team. We tackled everything from major concerns like poor network performance, security, cost, enterprise growth, configuration management, and vendor lock-in to enterprise-specific issues such as providing uninterrupted connectivity to critical apps and departments, managing BYOD policies, and predicting future bandwidth needs.

The relationship between steganography and cyberattacks

There’s no denying the importance of communication. Businesses cannot function without the proper means of communication, such as phone calls, faxes, emails, text messages, and more. However, not all forms of communication are secure, meaning the information transferred by them doesn’t always stay confidential. This is where steganography comes into play.

IT in 2018: A ManageEngine retrospective

2018 is coming to an end and you might already be looking back at how this year has been for you. In the IT world, 2018 started with the processor bugs Meltdown and Spectre. From there, the year was filled with data breaches and ransomware. But things weren’t all bad this year; the GDPR went into effect, which is a huge step forward in data privacy, and plenty of new technologies were released.

Cyber Security in the Movies - Is It Realistic?

Hacking in the movies looks so cool. Someone with a keyboard and five screens frantically types in some code, and a few seconds later: “I’m in.” That’s it– they now have all the information they need to access nuclear missile codes, blackmail a billionaire, or completely shut down a building’s security system.

Building confidence via automated container security scanning - Xavier Vello - DockerCon EU 2018

Container image security scanners are one of several tools we use in our development process to ensure the software that we ship to our customers is reliable and safe. In this talk, we’ll discuss our approach to continuous vulnerability monitoring (spoiler: it’s all automated), and how it increases our responsiveness while decreasing our operational cost.