Log360 | September 14, 2023Staying ahead of LockBit ransomware attacks LockBit is a Ransomware as a Service (RaaS) provider accountable for most LockBit...
Log360 | August 10, 2023[Webinar] How to bolster cybersecurity by gaining complete network visibility To prevent cyberattacks, you need complete visibility into all the events that occur...
Log360 | August 1, 2023ManageEngine Recognized as a Customers' Choice in 2023 Gartner® Peer Insights 'Voice of the Customer': Security Information and Event Management (SIEM) for the fourth time We're thrilled to announce that ManageEngine has once again been recognized as a...
Log360 | July 27, 2023Comprehensive visibility is the foundation for effective threat detection and response Businesses today are more dependent than ever on technology, making strong threat...
Log360 | July 25, 2023Breaking down India's cybersecurity: A comprehensive mid-year review and analysis As we cross the halfway mark of this year, we need to evaluate and understand the rising...
Log360 | July 10, 2023[Webinar] How to implement an effective data loss prevention strategy Data is your organization's lifeblood. Ensuring it doesn't fall into the wrong hands must...
Log360 | June 5, 2023[Webinar] How to measure the effectiveness of your security operations center Network visibility is the first step towards security. You need to know what activities...
Log360 | May 26, 2023CISO handbook: Cybersecurity metrics, budgeting, and leadership [E-book] Chief information security officers (CISOs) are the backbone behind the security...
Log360 | May 22, 2023User identity mapping for improved anomaly detection In any organization, a user may access numerous devices and applications, but not always...
Log360 | May 19, 2023Threat hunting 101: Leveraging the MITRE ATT&CK® framework for extended threat detection Threat detection and mitigation is one of the core responsibilities of a SOC. With...
Security Information and Event Management | May 18, 2023Will predictive AI revolutionize the SIEM industry? The cybersecurity industry is extremely dynamic and always finds a way to accommodate the...
Firewall Analyzer | May 17, 2023From logs to insights: Using Firewall Analyzer to monitor Squid proxy activity Squid proxies are among the most popular open-source proxy servers preferred by companies...