Security Information and Event Management | December 1, 2025Introducing flexible search and archival storage in Log360 Cloud We’re thrilled to announce the launch of Search and Archival storage options in Log360...
DataSecurity Plus | November 19, 2025Mastering cloud app control, Part 3: Governing file transfers In Part 1 and Part 2 of the cloud app control blog series, we saw how SinaraTech, a mid...
Log360 | November 14, 2025Log everything from anywhere: Centralizing log collection with Log360 In today's complex IT environments, comprehensive log collection is crucial for effective...
DataSecurity Plus | November 12, 2025Mastering cloud app control, Part 2: Hardening login security In Part 1 of the cloud app control series, we explored how SinaraTech, a mid-sized...
DataSecurity Plus | November 3, 2025Mastering cloud app control, Part 1: Locking down access When it comes to managing cloud application usage in an organization, the challenges are...
ADAudit Plus | October 31, 2025CVE-2025-59287 (RCE) turns WSUS into an attack vector: Track suspicious process behavior using ADAudit Plus CVE-2025-59287 in a nutshellA critical remote code execution (RCE) flaw (CVE-2025-59287)...
Log360 | August 5, 2025Top cyberattacks from the last six months: A deep dive into the digital battlefield Cyberattacks today have become sophisticated digital disasters, capable of disrupting...
Log360 | July 14, 2025Securing Windows services and Windows security logs Our IT security under attack campaign has been a continuous effort to help you verify and...
ADAudit Plus | June 6, 2025dMSA abuse (BadSuccessor) enables privilege escalation: Monitor critical attribute changes with ADAudit Plus A critical vulnerability, dubbed BadSuccessor, has been identified in Windows Server 2025....
Log360 | June 2, 2025Top 5 alternatives to Splunk in 2025: Smarter choices for smarter security The security information and event management (SIEM) space is evolving fast in 2025.When...
DataSecurity Plus | May 26, 2025The Change Healthcare hack wasn’t just a breach—it was a wake-up call "The US healthcare system is broken" is not an uncommon phrase. With no universal...
Log360 | May 9, 2025What is DORA and why is it critical for organizations to comply with it? The Digital Operational Resilience Act (DORA) is a security wake-up call specifically for...