Cybersecurity Acronyms – A Practical Glossary

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

Cybersecurity Acronyms

Whether you are a cybersecurity professional, an end-user, just starting in cybersecurity or interested in the field, this cybersecurity acronym practical glossary is for everyone. Cybersecurity acronyms can be confusing, especially with some acronyms having dual meanings – think IP address and IP for Intellectual Property – and some acronyms having very slight differences. Here, … Read more

Avoiding Rough Patches Using Patch Management

Author(s):

Aritri Saha, Content Writer, ManageEngine

Patch Management - Patches

Patch management is an essential part of sustaining IT services in this era of malware and growing cyber threats. Letting your guard down in network security makes your organization an easy target for cybercriminals. The responsibility for keeping the network safe and guarded is a herculean task, but automating the process can make any system … Read more

,

How to Become a SOC Analyst

Author(s):

Glenn Mabry, Senior Instructor/Security Researcher, Advanced Security

How to Become a SOC Analyst

A Security Operations Center, or SOC, is one of the most important departments for any modern business. It is here that the organization’s cybersecurity team does their job, monitoring and analyzing their security networks in case of bad actors or other cyber-attacks. Working in a SOC can be extremely exciting, but the journey to that … Read more

Even Cyber Pros Fall Victim to Cybercrime and Bad Habits

Author(s):

James Everett Lee, Chief Operating Officer, The Identity Theft Resource Center

Cyber Pros Fall Victim to Cybercrime

Back in January of 2021, you may have seen this eye-catching headline: “Hackers are targeting security researchers”. As it turns out, threat actors in North Korea were luring pen testers and other vulnerability professionals into a trap where a backdoor was installed on unsuspecting researchers’ operating systems. This scheme was discovered by Google’s Threat Analysis … Read more

,

Companies Must Prepare for Escalating Ransomware Attacks and Threats

Author(s):

Noman Ansari, Senior Writer, Malwarebytes

Ransomware Attacks - Cybersecurity Software

There certainly have been some dangerous ransomware attacks in the recent past. In 2017, the WannaCry ransomware attack exploited a security flaw in Microsoft Windows OS to hold over 200,000 computers hostage worldwide. The hospitals that were struck by WannaCry had to cancel essential procedures, including emergency services. After postponing thousands of appointments, the costs … Read more

5 Factors for Evaluating an RMM Tool for the Modern MSP

Author(s):

Nisha Balajee, Product Marketer, ManageEngine

RMM Solutions for MPS

Managed Service Providers (MSPs) are becoming increasingly important in the IT management industry. The role of an MSP does not just stop with monitoring, managing, and maintaining the IT services of their clients; it extends to keeping a close watch on everyday IT developments and proactively securing clients’ IT networks against cyberthreats. To balance all … Read more

All Aboard! Onboarding and Securing Your New Endpoints

Author(s):

Sudarshan Kumar, Content Writer - EMS Marketing, ManageEngine

Onboarding and Securing Endpoints with Desktop Central

Any IT admin worth their salt knows that onboarding new employees or endpoints is not quite as simple as yelling “All aboard!” like a merry captain of a cruise ship. It’s been more than a year since most of us started working remotely, and for many organizations, it looks like this new way of working … Read more

5G Technology and Cybersecurity

Author(s):

Rina Richell, SEO Analytics Manager,

5G Technology and Cybersecurity

The rave that came in with the advent of 5G Technology was well-founded with the promise of promoting smart cities, a much faster internet connection for cell phones, and faster data download and upload speeds. This technology, by every standard, deserves to be received and celebrated. With the advancement of 5G came new possibilities not … Read more