• NotPetya -  Not your average ransomware
    Attack Detection Nov 29, 2022 5 min

    NotPetya - Not your average ransomware

    Ransomware remains one of the most devastating forms of cyberattack. In June 2021, the average weekly ransomware activity was 10.7 times higher than the previous year.

    Read more 
  • Spotting the differences between SSH and Telnet
    Data Security Nov 29, 2022 3 min

    Spotting the differences between SSH and Telnet

    SSH and Telnet are two communication protocols that help users establish connections with remote systems.

    Read more 
  • Scrutinizing seasonality in depth
    UEBA Nov 28, 2022 6 min

    Scrutinizing seasonality in depth

    A SIEM solution's anomaly detection capability, UEBA, is powered by machine learning algorithms to identify deviations from the expected behavior of users and entities.

    Read more 
  • From grey matter to BlackMatter: Addressing cognitive overload in SOC teams
    Attack Detection Nov 24, 2022 4 min

    From grey matter to BlackMatter: Addressing cognitive overload in SOC teams

    All SOC teams face cognitive overload from time to time. Danika Nilson, cyber threat hunter at Forescout Frontline, faced it during a week-long red team/blue team exercise of 'defend the castle' (i.e. protect your network).

    Read more 
  • What is a security operation center and what should you know about it?
    Data Security Nov 21, 2022 5 min

    What is a security operation center and what should you know about it?

    A security operations center (SOC) is an enterprise monitoring and alerting facility that helps organizations detect security threats, monitor security events, and analyze performance data to improve company operations.

    Read more 

Featured Articles

  • 5 cognitive biases that affect your cybersecurity decisions
    SIEM Jun 28, 2022 6 min

    5 cognitive biases that affect your cybersecurity decisions

    Read more 
  • importance-seasonality-factors-anomaly-detection-cybersecurity
    SIEM Feb 10, 2022 3 min

    Why seasonality factors are important to anomaly detection in cybersecurity

    Read more 
  • 8-cloud-security-tips-you-should-not-ignore
    Cloud Security Feb 10, 2022 4 min

    8 cloud security tips you shouldn't
    ignore

    Read more 
  • phishing-malware-valentines-day-2022
    Attack detection Feb 14, 2022 6 min

    Hackers embrace their love for phishing this Valentine's Day

    Read more 

New Posts

  • SQL injection and cross-site scripting: The differences and attack anatomy

     
  • SIEM 6 min

    Log collection 101: Covering the basics

     
  • Disruptionware: A current favorite among cyber-attackers

     

About Expert Talks

Organizations nowadays need to upgrade their threat detection and response capabilities. Lack of experience and knowledge about the current cybersecurity landscape can cost you millions of dollars. But with a strong security strategy, it's definitely possible to prevent that from happening.

ManageEngine Expert Talks is here just to do that.

We deliver content that help you devise the best cybersecurity strategies to help you think ahead of any possible attacks.

Looks interesting?

Subscribe to the best source of information on cybersecurity.

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  •  
  •  
    By clicking on Keep me Updated you agree to processing of personal data according to the Privacy Policy.

SIEM

See all
  • Log collection 101: Covering the basics
    SIEM Nov 14, 2022 6 min

    Log collection 101: Covering the basics

    Logs are a record of everything that is happening inside the IT environment of your organization.

    Read more 
  • Calculating the cost savings of a SIEM solution
    SIEM Nov 04, 2022 6 min

    Calculating the cost savings of a SIEM solution

    If you are a CISO or a decision maker looking to bring value to the table by investing in an effective security information and event management (SIEM) solution...

    Read more 
  • Cloud SIEM vs on-premises SIEM: How do you choose the best cybersecurity solution?
    SIEM Sep 13, 2022 5 min

    Cloud SIEM vs on-premises SIEM: How do you choose the best cybersecurity solution?

    Security information and event management (SIEM) as a cybersecurity solution...

    Read more 

Attack detection

See all
  • NotPetya -  Not your average ransomware
    Attack detection Nov 29, 2022 5 min

    NotPetya - Not your average ransomware

    Ransomware remains one of the most devastating forms of cyberattack.

    Read more 
  • From grey matter to BlackMatter: Addressing cognitive overload in SOC teams
    Attack detection Nov 24, 2022 4 min

    From grey matter to BlackMatter: Addressing cognitive overload in SOC teams

    All SOC teams face cognitive overload from time to time.

    Read more 
  • SQL injection and cross-site scripting: The differences and attack anatomy
    Attack detection Nov 15, 2022 5 min

    SQL injection and cross-site scripting: The differences and attack anatomy

    Cyberattackers are always on the lookout for any potential vulnerability that can...

    Read more 

Cloud Security

See all
  • The high price of careless cloud app usage
    Cloud Security May 11, 2022 4 min

    The high price of careless cloud app usage

    If you believe internal attacks are caused only by malicious insiders, think again. According to a Ponemon Institute report from 2022, employee...

    Read more 
  • CASBs for multi-cloud
    Cloud Security Apr `5, 2022 4 min

    CASBs for multi-cloud

    Security is a big issue IT teams face when it comes to multi-cloud management. A cloud access security broker (CASB) provides organizations with a much-needed opportunity...

    Read more 
  • Shedding light on shadow IT and data exfiltration with CASB
    Cloud Security Feb 10, 2022 5 min

    Shedding light on shadow IT and data exfiltration with CASB

    The days when employees and assets functioned only within the company network are long gone. Now, all that is required is a username and password...

    Read more 

Data Security

See all
  • Spotting the differences between SSH and Telnet
    Data Security Nov 29, 2022 3 min

    Spotting the differences between SSH and Telnet

    SSH and Telnet are two communication protocols that help users establish connections with remote systems.

    Read more 
  • What is a security operation center and what should you know about it?
    Data Security Nov 21, 2022 5 min

    What is a security operation center and what should you know about it?

    A security operations center (SOC) is an enterprise monitoring and alerting...

    Read more 
  • Cyberwar games: An effective strategy for enhanced cyberdefense
    Data Security Nov 09, 2022 5 min

    Cyberwar games: An effective strategy for enhanced cyberdefense

    War games are not new. Armed forces throughout history have been conducting...

    Read more 

UEBA

See all
  • Scrutinizing seasonality in depth
    UEBA Nov 28, 2022 6 min

    Scrutinizing seasonality in depth

    A SIEM solution's anomaly detection capability, UEBA, is powered by machine learning algorithms to identify deviations from the expected behavior of users and entities.

    Read more 
  • Digging deeper into peer group analysis
    UEBA Sep 12, 2022 7 min

    Digging deeper into peer group analysis

    It's critical for a security analyst to be aware of all the activities happening in their organization's network.

    Read more 
  • Enhance risk scoring accuracy and anomaly detection with peer group analysis
    UEBA May 30, 2022 6 min

    Enhance risk scoring accuracy and anomaly detection with peer group analysis

    UEBA, the anomaly detection capability of a SIEM solution, is used to identify...

    Read more 

Threats in three minutes

See all
  •  

    Conti ransomware

    Conti is a ransomware-as-a-service affiliate program associated with Russian threat actors. The developers of this ransomware sell or lease their ransomware technology...

    Play now
     
  •  

    Apache Log4j vulnerability

    Logging is a fundamental feature of software. A flaw in Log4j, a Java-based logging utility, has been deemed as one of the most high-profile security risks...

    Play now
     
  •  

    US government probes VPN hack within federal agencies

    On April 29, 2022, the United States government investigated a hack against federal agencies...

    Play now
     

Get the latest content delivered
right to your inbox!

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  •  
  •  
    By clicking on Keep me Updated you agree to processing of personal data according to the Privacy Policy.

EXPERT TALKS

     
     

2021 Zoho Corporation Pvt. Ltd. All rights reserved.