Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Top tips: Secure your devices before you disconnect for the holidays

Top tips is a weekly column where we highlight what’s trending in the tech world and share ways to stay ahead. This week, as the holiday season rolls in and many of us finally take that much-needed break, let’s talk about something equally important: Stepping away from work safely. The holidays are all about resting–logging off and soaking in all the merry feelings. But to truly switch into that much-needed DND mode, it helps to secure your devices before you head out for the holidays.

Top 2025 Network and Cybersecurity awards honor Firewall Analyzer

We are excited to announce that ManageEngine Firewall Analyzer has been recognized with multiple prestigious industry awards across the Cybersecurity and Network Security categories. These honors reflect the trust and confidence our users place in Firewall Analyzer as their go-to solution for firewall management, security visibility, and compliance reporting.

Top tips: Cyber hygiene habits you can build this week

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week, we’re breaking down the simple cyber hygiene habits that can make your digital life safer, calmer, and far easier to manage. If digital life had a skincare routine, most of us would be walking around with unwashed faces and expired sunscreen.

Introducing DDI Central 5.6: Anomaly-aware, forecast-driven, monitoring-powered, Cisco-Smart DDI for modern networks

When we shipped DDI Central 5.5, we brought STIX/TAXII-powered threat intelligence into your DDI stack—enabling you to detect and respond to known threats in real time, using globally curated indicators of compromise. That release turned DNS and DHCP into active players in enterprise security.

Top tips to keep your wearables from leaking your health data

Top tips is a weekly column where we break down what's shaping the tech landscape and share practical ways you can stay informed and protected. This week, we’re looking at why safeguarding the health data collected by wearables is just as important as tracking your fitness goals. Wearables don't just track steps and sleep, they collect some of the most intimate health information we have, including: heart rate, blood sugar, medication routines, stress levels, and sleep patterns.

Five worthy reads: Identity fabric: Intertwining identities to create an impenetrable shield

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. In this week's edition, we will discuss how the concept of identity fabric has evolved and what it holds for the future. Securing digital identities is no longer a one-man show; it is everyone's game now.

Device provisioning struggles due to M&As, high staff turnovers, and Epic go-lives

Two primary trends are reshaping the healthcare industry: First, healthcare experiences a high number of mergers and acquisitions (M&As), with affiliates frequently joining and exiting as contracts evolve. Second, staff turnover remains persistently high, largely driven by burnout among healthcare practitioners.

Mastering cloud app control, Part 3: Governing file transfers

In Part 1 and Part 2 of the cloud app control blog series, we saw how SinaraTech, a mid-sized ecommerce company, used access control to block risky apps and login control to weed out unauthorized access to legit applications. But the danger wasn't over yet. The Security SOC team had one final piece that was missing from the cloud app control puzzle. Let's continue down the road to find that piece.

Cisco SNMP exploit targets IOS and IOS XE devices: What it means for your network

SNMP has always been one of the quiet but crucial components of network management. It helps administrators monitor devices, automate configurations, and keep operations running smoothly. On Sept. 24, 2025, Cisco disclosed a high-severity vulnerability, identified as CVE-2025-20352, affecting the SNMP implementation in its IOS and IOS XE software. This issue allows attackers with valid SNMP credentials to cause a denial of service or execute arbitrary code on the affected devices.

Log everything from anywhere: Centralizing log collection with Log360

In today's complex IT environments, comprehensive log collection is crucial for effective auditing and security monitoring. Without this, endpoints, especially those that are VPN-joined, stay out of your reach while auditing. This was the bottleneck faced by our Log360 customer who recently availed OnboardPro, ManageEngine's professional services. They knew Log360 was capable of collecting logs from all their network devices—but what about the endpoints that were connected remotely via VPN?