• 5 cognitive biases that affect your cybersecurity decisions
    SIEM Jun 28, 2022 6 min

    5 cognitive biases that affect your cybersecurity decisions

    The world has witnessed several instances where countries fight each other for power, territory, resources, and more. First world countries have dedicated budget for military spending, predominantly invested in R&D.

    Read more 
  • Phishing for information, Part 2: Tactics and techniques
    Attack Detection June 23, 2022 6 min

    Phishing for information, Part 2: Tactics and techniques

    As explored in Part 1, phishing is a social engineering attack in which attackers prey on human error and the vulnerability of users and systems in order to obtain sensitive information. There are several types of phishing attacks, each of which involves specific attack vectors and methodologies.

    Read more 
  • Demystifying SQL injection attacks
    Attack Detection Jun 22, 2022 5 min

    Demystifying SQL injection attacks

    With the ever-evolving threat landscape, cyberattacks have become more sophisticated; malicious actors are carrying out more advanced cyberattacks with serious consequences on users and organizations.

    Read more 
  • Deepfake technology: An emerging cybersecurity threat
    Attack Detection Jun 21, 2022 5 min

    Deepfake technology: An emerging cybersecurity threat

    Deepfake technology, which was recently identified as becoming a credible cyberthreat, emphasizes the notion that an attack can arise from anywhere.

    Read more 

Featured Articles

  • 5 cognitive biases that affect your cybersecurity decisions
    SIEM Jun 28, 2022 6 min

    5 cognitive biases that affect your cybersecurity decisions

    Read more 
  • importance-seasonality-factors-anomaly-detection-cybersecurity
    SIEM Feb 10, 2022 3 min

    Why seasonality factors are important to anomaly detection in cybersecurity

    Read more 
  • 8-cloud-security-tips-you-should-not-ignore
    Cloud Security Feb 10, 2022 4 min

    8 cloud security tips you shouldn't
    ignore

    Read more 
  • phishing-malware-valentines-day-2022
    Attack detection Feb 14, 2022 6 min

    Hackers embrace their love for phishing this Valentine's Day

    Read more 

New Posts

  • SIEM 5 min

    Will healthcare be the biggest arena for cyber warfare?

     
  • UEBA 6 min

    Enhance risk scoring accuracy and anomaly detection with peer group analysis

     
  • Cryptojacking demystified: Part 2

     

About Expert Talks

Organizations nowadays need to upgrade their threat detection and response capabilities. Lack of experience and knowledge about the current cybersecurity landscape can cost you millions of dollars. But with a strong security strategy, it's definitely possible to prevent that from happening.

ManageEngine Expert Talks is here just to do that.

We deliver content that help you devise the best cybersecurity strategies to help you think ahead of any possible attacks.

Looks interesting?

Subscribe to the best source of information on cybersecurity.

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  •  
  •  
    By clicking on Keep me Updated you agree to processing of personal data according to the Privacy Policy.

SIEM

See all
  • 5 cognitive biases that affect your cybersecurity decisions
    SIEM Jun 21, 2022 6 min

    5 cognitive biases that affect your cybersecurity decisions

    Humans are perfectly irrational beings who are vulnerable to certain errors in judgement. So let's explore how these...

    Read more 
  • Will healthcare be the biggest arena for cyber warfare?
    SIEM Jun 21, 2022 5 min

    Will healthcare be the biggest arena for cyber warfare?

    The world has witnessed several instances where countries fight each other for power, territory, resources, and more.

    Read more 
  • SIEM vs. SOAR: What's the difference?
    SIEM Jun 20, 2022 5 min

    SIEM vs. SOAR: What's the difference?

    Security information and event management (SIEM) and security orchestration, automation and response (SOAR) are both integral tools of a security operations center (SOC).

    Read more 

Attack detection

See all
  • Phishing for information, Part 2: Tactics and techniques
    Attack detection Jun 24, 2022 6 min

    Phishing for information, Part 2: Tactics and techniques

    As explored in Part 1, phishing is a social engineering attack in which attackers prey on human error and the vulnerability...

    Read more 
  • Demystifying SQL injection attacks
    Attack detection Jun 22, 2022 5 min

    Demystifying SQL injection attacks

    With the ever-evolving threat landscape, cyberattacks have become more sophisticated; malicious actors are carrying out more advanced...

    Read more 
  • Deepfake technology: An emerging cybersecurity threat
    Attack detection Jun 21, 2022 5 min

    Deepfake technology: An emerging cybersecurity threat

    Deepfake technology, which was recently identified as becoming a credible cyberthreat, emphasizes the notion...

    Read more 

Cloud Security

See all
  • The high price of careless cloud app usage
    Cloud Security May 11, 2022 4 min

    The high price of careless cloud app usage

    If you believe internal attacks are caused only by malicious insiders, think again. According to a Ponemon Institute report from 2022, employee...

    Read more 
  • CASBs for multi-cloud
    Cloud Security Apr `5, 2022 4 min

    CASBs for multi-cloud

    Security is a big issue IT teams face when it comes to multi-cloud management. A cloud access security broker (CASB) provides organizations with a much-needed opportunity...

    Read more 
  • Shedding light on shadow IT and data exfiltration with CASB
    Cloud Security Feb 10, 2022 5 min

    Shedding light on shadow IT and data exfiltration with CASB

    The days when employees and assets functioned only within the company network are long gone. Now, all that is required is a username and password...

    Read more 

Data Security

See all
  • Getting started with ISO 27001? Here's what you need to know
    Data Security May 26, 2022 6 min

    Getting started with ISO 27001? Here's what you need to know

    The ISO 27000 family of standards acts as an information security management framework for institutions around the world.

    Read more 
  • Essential Eight explained: ACSC's key security controls for organizational cybersecurity
    Data Security May 12, 2022 6 min

    Essential Eight explained: ACSC's key security controls for organizational cybersecurity

    In February, during the onset of the Russia-Ukraine war, the Australian Cyber Security Center (ACSC) sent out a key...

    Read more 
  • Security streams you must know to commence your career in cybersecurity: Part 1
    Data Security Apr 28, 2022 6 min

    Security streams you must know to commence your career in cybersecurity: Part 2

    Hi, there! It's nice to see you again. If you're excited about exploring a few more vital security streams, you won't be disappointed.

    Read more 

UEBA

See all
  • Enhance risk scoring accuracy and anomaly detection with peer group analysis
    UEBA May 30, 2022 6 min

    Enhance risk scoring accuracy and anomaly detection with peer group analysis

    UEBA, the anomaly detection capability of a SIEM solution, is used to identify...

    Read more 
  • unraveling-the-behavioral-blueprint-of-users-and-entities-with-ueba
    UEBA Mar 2, 2022 6 min

    Unraveling the behavioral blueprint of users and entities with UEBA

    Cyberattacks are a growing menace, with yet another hacking attempt every 39 seconds. The Identity Theft Resource Center (ITRC)

    Read more 

Threats in three minutes

See all
  •  

    Conti ransomware

    Conti is a ransomware-as-a-service affiliate program associated with Russian threat actors. The developers of this ransomware sell or lease their ransomware technology...

    Play now
     
  •  

    Apache Log4j vulnerability

    Logging is a fundamental feature of software. A flaw in Log4j, a Java-based logging utility, has been deemed as one of the most high-profile security risks...

    Play now
     
  •  

    US government probes VPN hack within federal agencies

    On April 29, 2022, the United States government investigated a hack against federal agencies...

    Play now
     

Get the latest content delivered
right to your inbox!

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  •  
  •  
    By clicking on Keep me Updated you agree to processing of personal data according to the Privacy Policy.

EXPERT TALKS

     
     

© 2021 Zoho Corporation Pvt. Ltd. All rights reserved.