• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

Staying ahead of LockBit ransomware attacks

Log360 | September 14, 2023

Staying ahead of LockBit ransomware attacks

LockBit is a Ransomware as a Service (RaaS) provider accountable for most LockBit...

[Webinar] How to bolster cybersecurity by gaining complete network visibility

Log360 | August 10, 2023

[Webinar] How to bolster cybersecurity by gaining complete network visibility

To prevent cyberattacks, you need complete visibility into all the events that occur...

ManageEngine Recognized as a Customers' Choice in 2023 Gartner® Peer Insights 'Voice of the Customer': Security Information and Event Management (SIEM) for the fourth time

Log360 | August 1, 2023

ManageEngine Recognized as a Customers' Choice in 2023 Gartner® Peer Insights 'Voice of the Customer': Security Information and Event Management (SIEM) for the fourth time

We're thrilled to announce that ManageEngine has once again been recognized as a...

Comprehensive visibility is the foundation for effective threat detection and response

Log360 | July 27, 2023

Comprehensive visibility is the foundation for effective threat detection and response

Businesses today are more dependent than ever on technology, making strong threat...

Breaking down India's cybersecurity: A comprehensive mid-year review and analysis

Log360 | July 25, 2023

Breaking down India's cybersecurity: A comprehensive mid-year review and analysis

As we cross the halfway mark of this year, we need to evaluate and understand the rising...

[Webinar] How to implement an effective data loss prevention strategy

Log360 | July 10, 2023

[Webinar] How to implement an effective data loss prevention strategy

Data is your organization's lifeblood. Ensuring it doesn't fall into the wrong hands must...

[Webinar] How to measure the effectiveness of your security operations center

Log360 | June 5, 2023

[Webinar] How to measure the effectiveness of your security operations center

Network visibility is the first step towards security. You need to know what activities...

CISO handbook: Cybersecurity metrics, budgeting, and leadership [E-book]

Log360 | May 26, 2023

CISO handbook: Cybersecurity metrics, budgeting, and leadership [E-book]

Chief information security officers (CISOs) are the backbone behind the security...

User identity mapping for improved anomaly detection

Log360 | May 22, 2023

User identity mapping for improved anomaly detection

In any organization, a user may access numerous devices and applications, but not always...

Log360 | May 19, 2023

Threat hunting 101: Leveraging the MITRE ATT&CK® framework for extended threat detection

Threat detection and mitigation is one of the core responsibilities of a SOC. With...

Will predictive AI revolutionize the SIEM industry?

Security Information and Event Management | May 18, 2023

Will predictive AI revolutionize the SIEM industry?

The cybersecurity industry is extremely dynamic and always finds a way to accommodate the...

From logs to insights: Using Firewall Analyzer to monitor Squid proxy activity

Firewall Analyzer | May 17, 2023

From logs to insights: Using Firewall Analyzer to monitor Squid proxy activity

Squid proxies are among the most popular open-source proxy servers preferred by companies...

Page 5 of 29« First«...34567...»Last »