• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

USB review, Part 2: How to manage USB devices

DataSecurity Plus | March 20, 2024

USB review, Part 2: How to manage USB devices

In this two-part series, the first blog demonstrates how USB devices can be conduits of...

Evaluating the differences: What businesses should know about PCI DSS v4.0 versus v3.2.1

Security Information and Event Management | February 28, 2024

Evaluating the differences: What businesses should know about PCI DSS v4.0 versus v3.2.1

In the realm of payment security, the Payment Card Industry Data Security Standard (PCI...

Data poisoning: Prevention strategies to keep your data safe

Log360 | January 30, 2024

Data poisoning: Prevention strategies to keep your data safe

The amount of data generated and fed into AI systems has increased quickly over the last...

USB review, Part 1: How are USB flash drives a security risk?

DataSecurity Plus | January 17, 2024

USB review, Part 1: How are USB flash drives a security risk?

We've all used pocket-sized USB drives to store and transfer data. We've also lost them...

Protecting your SDLC from a supply chain attack

Log360 | December 19, 2023

Protecting your SDLC from a supply chain attack

Did you know that nine out of 10 companies detected software supply chain risks in the...

ADAudit Plus | November 21, 2023

5 limitations of Windows auditing tools and how you can overcome them [Free e-book]

Auditing is essential for addressing security, operational, and compliance needs in a...

How to improve risk scoring and threat detection with UEBA [Free e-book]

Log360 | November 16, 2023

How to improve risk scoring and threat detection with UEBA [Free e-book]

Did you know that in 2022, the mean time to detect a breach was as many as 207 days? It's...

Cisco firewall management: Simplify your network security with Firewall Analyzer

Firewall Analyzer | November 10, 2023

Cisco firewall management: Simplify your network security with Firewall Analyzer

Firewalls act as the first line of defense against external threats and form the core of...

Navigating the cyber battleground: The vital role of network security policy management

Firewall Analyzer | October 23, 2023

Navigating the cyber battleground: The vital role of network security policy management

The landscape of cyberthreats is continuously evolving, and to keep pace organizations...

Access granted: Mastering the art of permissions

DataSecurity Plus | October 11, 2023

Access granted: Mastering the art of permissions

Back in the 20th century, cyberattacks were harder to execute because most computers were...

The Windows LDAP bind security vulnerability you should know about

ADAudit Plus | October 5, 2023

The Windows LDAP bind security vulnerability you should know about

The Lightweight Directory Access Protocol (LDAP) is used by directory clients to access...

Cybersecurity KPI metrics that CISOs should track

Log360 | September 18, 2023

Cybersecurity KPI metrics that CISOs should track

It's important for chief information security officers (CISOs) to track certain metrics...

Page 4 of 29« First«...23456...»Last »