• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

The states of data, Part 1: Why you should protect data at rest, in use, and in motion

DataSecurity Plus | September 17, 2024

The states of data, Part 1: Why you should protect data at rest, in use, and in motion

What do Morgan Stanley, Samsung, and a New York credit union all have in common? They...

The HIPAA compliance checklist for security managers

Log360 | September 17, 2024

The HIPAA compliance checklist for security managers

The healthcare sector in the United States has seen a continuous increase in both the...

7 firewall management best practices in 2024

Firewall Analyzer | September 13, 2024

7 firewall management best practices in 2024

Firewalls act as the first line of defense, filtering network traffic and blocking...

Enhance network security: 6 key steps for an effective firewall rule audit

Firewall Analyzer | September 4, 2024

Enhance network security: 6 key steps for an effective firewall rule audit

A firewall rule audit is an essential process for ensuring that your firewall rules are...

Data classification: The fundamental requirement of successful DLP programs

DataSecurity Plus | September 3, 2024

Data classification: The fundamental requirement of successful DLP programs

The way we store data has undergone a dramatic shift. From good ol' floppy disks   to...

Strengthening your defenses: Aligning Firewall Analyzer with the new PCI DSS v4.0 standards

Firewall Analyzer | August 19, 2024

Strengthening your defenses: Aligning Firewall Analyzer with the new PCI DSS v4.0 standards

According to IBM's 2023 Cost of a Data Breach Report, the global average cost of a data...

Leverage GSMA compliance to drive secure firewall configurations with Firewall Analyzer

Firewall Analyzer | August 14, 2024

Leverage GSMA compliance to drive secure firewall configurations with Firewall Analyzer

The GSM Association, which stands for the Global System for Mobile Communications...

Dark web monitoring as your early warning system for insider threats

Log360 | July 29, 2024

Dark web monitoring as your early warning system for insider threats

According to the 2023 Insider Threat Report by Cybersecurity Insiders, 74% of...

Data security threats: How to safeguard your data from modern pirates [Free e-book]

DataSecurity Plus | July 26, 2024

Data security threats: How to safeguard your data from modern pirates [Free e-book]

To stay safe from modern-day pirates, you need elaborate, multi-layered security measures...

ManageEngine Firewall Analyzer Named Leader in G2 Grid® for Network Security Policy Management

Firewall Analyzer | May 30, 2024

ManageEngine Firewall Analyzer Named Leader in G2 Grid® for Network Security Policy Management

We are thrilled to announce that ManageEngine Firewall Analyzer has been recognized as a...

Log360 | May 13, 2024

Has your personal data been breached on the dark web?

The dark web can feel like a mysterious underworld, a hidden corner of the internet where...

Understanding the foundation: Exploring the world of firewall security

Firewall Analyzer | May 3, 2024

Understanding the foundation: Exploring the world of firewall security

In the vast cybersecurity landscape, one fundamental element stands tall as a guardian...

Page 3 of 29«12345...»Last »