Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Native SOAR in Log360 Cloud: Closing the gap between detection and response

Security teams today don’t struggle because they lack visibility. They struggle because every meaningful investigation still depends on too much manual work. An alert fires. Analysts pivot between dashboards. They pull identity context from one tool, endpoint telemetry from another, and threat intelligence from somewhere else entirely. Then comes the response; disabling users, isolating endpoints, resetting passwords, notifying stakeholders, documenting incidents.

DDI Central 6.2: Now with GSS TSIG authentication, LDAP and LDAPS user provisioning, and Native Windows scavenging

DDI Central version 6.1 introduced significant enhancements to the IPAM section, bringing a segmented view for sites, clusters, and supernets, along with multiple display options: table, tree, and card views. The release also added trusted feed configurations, root hint templates, and unmapped subnet monitoring, giving network admins greater flexibility and control over their DNS and DHCP resources.

Strengthening enterprise security: OpManager Nexus achieves FIPS 140-3 compliance

ManageEngine OpManager Nexus achieving FIPS 140-3 compliance marks a significant step forward. It signals a stronger commitment to cryptographic integrity, regulatory readiness, and enterprise-grade security—without compromising operational efficiency.

Hybrid visibility done right: Visualize, monitor, and correlate your VPCs, Subnets, EC2, ECS, and RDS services with AWS Cloud Observability in DDI Central

Every enterprise today runs on two kinds of infrastructure. One half lives on-premises: the company’s data centers, internal networks, DNS zones, DHCP scopes, IP address spaces, and the systems that help every device find and connect to the right service. The other half lives in the public cloud: where applications, databases, containers, and storage run on infrastructure delivered by providers like Amazon Web Services (AWS). This hybrid model is no longer a temporary phase.

Top tips: How you can shrink the time between a vulnerability and an attack

Top tips is a weekly column where we highlight what’s trending in the tech world and share ways to stay ahead. This week, we’re looking at how the gap between a vulnerability and an attack is shrinking rapidly. A vulnerability is discovered. It could be a small bug, a missed update, or a gap in how a system is configured. It gets reported, documented, and sometimes even publicly disclosed. For a long time, there used to be an extended window between discovery and attack.
Featured Post

Keep an eye out, breaches leave patterns

Most major security breaches in the last five years had one thing in common. Not just unpatched vulnerabilities, but a decision someone made to live with it. A VPN credential that never got rotated, an admin account that outlasted the employee who owned it, or a privilege elevation request approved because it was easier than asking questions. The details change, but the pattern doesn't. This isn't a story about sophisticated attackers. It's a story about blind spots, misplaced trust, and what happens when organizations mistake the absence of an incident for the presence of security.

How cybersecurity builds a sustainable future

On a quiet Monday morning, Maya, the IT manager of a rapidly growing renewable energy company, sat down with her coffee and opened her laptop. The dashboard looked normal: energy production steady, systems online, and wind farms operating smoothly across multiple regions. Outside her office window, rows of wind turbines stretched across the horizon, slowly turning in the soft morning light. Each turbine represented progress: a step toward clean energy and a more sustainable future.

How DDI Central's DNS security features help organizations build a stable, resilient DNS network

Most security investments focus on the perimeter, like firewalls, endpoint agents, and SIEM alerts. Yet one of the most abused channels in enterprise attacks barely gets a second look: DNS. Before malware is executed, before data is exfiltrated, and before a lateral movement attempt begins, DNS is involved. Attackers use it to find footholds, establish command-and-control (C2) channels, and quietly map internal infrastructure.

DNS anomaly detection with machine learning: How ManageEngine DDI Central stops threats before they start

Most breaches don't announce themselves; they whisper. A subtly malformed DNS query here. A DHCP lease request that looks almost normal there. A client that suddenly requests a domain no one in your organization has ever heard of. By the time these whispers become alarms on a SIEM dashboard, attackers have often already moved laterally, exfiltrated data, or cemented persistence. In traditional DNS, DHCP, and IPAM (DDI) setups, these signals are buried under millions of legitimate transactions.