EventLog Analyzer | March 13, 2018Talk to our experts about the essentials of log management Log management is a pillar of security information and event management (SIEM), and is...
Security Information and Event Management | February 28, 2018A reminder to focus on securing your databases and web servers The trend of global cyberattacks has continued into February. In California, The...
EventLog Analyzer | January 31, 2018Let's talk about STIX, TAXII, and threat intelligence In terms of collaboration, Structured Threat Information eXpression (STIX) and Trusted...
Log360 | October 10, 2017Six things to consider before choosing a log management solution Budgeting for IT has always been a problematic topic of discussion when planning an...
Log360 | September 20, 2017Adopting a SIEM solution? Here's what you need to know Cyberattacks have become an everyday affair, especially with the WannaCry attack and...
EventLog Analyzer | August 28, 2017Getting to know the GDPR: The technical and organizational measures Before we jump into the third part of this GDPR blog series, let's take a moment to think...
Log360 | July 18, 2017The case for incident management in a SIEM system Log360's latest incident management system is the perfect bridge between your incident...
EventLog Analyzer | March 21, 2017Could adding devices for log collection be any easier? In December, we released EventLog Analyzer 11.3, which automatically discovers Windows...
EventLog Analyzer | December 6, 2016Three ways EventLog Analyzer enhances SIEM usability When people talk about SIEM, they don't usually focus on usability. Vendors tend to focus...
EventLog Analyzer | November 14, 2016How EventLog Analyzer simplifies log searches Log data can be massive even in small organizations. Many of these logs might just be...
EventLog Analyzer | October 21, 2016Halloween contest: What is your biggest fear? Zombies or hackers? It’s that time of the year again when as the leaves fall, we brace ourselves for copious...
EventLog Analyzer | October 7, 2016Looking beyond Windows part 2: Application log management Earlier, we discussed how effective syslog management can improve your network's security....