• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

Introducing flexible search and archival storage in Log360 Cloud

Security Information and Event Management | December 1, 2025

Introducing flexible search and archival storage in Log360 Cloud

We’re thrilled to announce the launch of Search and Archival storage options in Log360...

Mastering cloud app control, Part 3: Governing file transfers

DataSecurity Plus | November 19, 2025

Mastering cloud app control, Part 3: Governing file transfers

In Part 1 and Part 2 of the cloud app control blog series, we saw how SinaraTech, a mid...

Log everything from anywhere: Centralizing log collection with Log360

Log360 | November 14, 2025

Log everything from anywhere: Centralizing log collection with Log360

In today's complex IT environments, comprehensive log collection is crucial for effective...

Mastering cloud app control, Part 2: Hardening login security

DataSecurity Plus | November 12, 2025

Mastering cloud app control, Part 2: Hardening login security

In Part 1 of the cloud app control series, we explored how SinaraTech, a mid-sized...

Mastering cloud app control, Part 1: Locking down access

DataSecurity Plus | November 3, 2025

Mastering cloud app control, Part 1: Locking down access

When it comes to managing cloud application usage in an organization, the challenges are...

CVE-2025-59287 (RCE) turns WSUS into an attack vector: Track suspicious process behavior using ADAudit Plus

ADAudit Plus | October 31, 2025

CVE-2025-59287 (RCE) turns WSUS into an attack vector: Track suspicious process behavior using ADAudit Plus

CVE-2025-59287 in a nutshellA critical remote code execution (RCE) flaw (CVE-2025-59287)...

Top cyberattacks from the last six months: A deep dive into the digital battlefield

Log360 | August 5, 2025

Top cyberattacks from the last six months: A deep dive into the digital battlefield

Cyberattacks today have become sophisticated digital disasters, capable of disrupting...

Securing Windows services and Windows security logs

Log360 | July 14, 2025

Securing Windows services and Windows security logs

Our IT security under attack campaign has been a continuous effort to help you verify and...

dMSA abuse (BadSuccessor) enables privilege escalation: Monitor critical attribute changes with ADAudit Plus

ADAudit Plus | June 6, 2025

dMSA abuse (BadSuccessor) enables privilege escalation: Monitor critical attribute changes with ADAudit Plus

A critical vulnerability, dubbed BadSuccessor, has been identified in Windows Server 2025....

Top 5 alternatives to Splunk in 2025: Smarter choices for smarter security

Log360 | June 2, 2025

Top 5 alternatives to Splunk in 2025: Smarter choices for smarter security

The security information and event management (SIEM) space is evolving fast in 2025.When...

The Change Healthcare hack wasn’t just a breach—it was a wake-up call

DataSecurity Plus | May 26, 2025

The Change Healthcare hack wasn’t just a breach—it was a wake-up call

"The US healthcare system is broken" is not an uncommon phrase. With no universal...

Log360 | May 9, 2025

What is DORA and why is it critical for organizations to comply with it?

The Digital Operational Resilience Act (DORA) is a security wake-up call specifically for...

Page 1 of 29123...»Last »