• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

7 key features of SIEM that every enterprise administrator should be aware of

Security Information and Event Management | October 10, 2022

7 key features of SIEM that every enterprise administrator should be aware of

A SIEM solution has become an integral part of an organization's security arsenal. But...

[Webinar] The top-five correlation rules to master threat detection in your network

Log360 | October 6, 2022

[Webinar] The top-five correlation rules to master threat detection in your network

Correlating events to identify if they are part of a larger incident or attack is one of...

Device discovery: The path to total network visibility

Log360 | October 3, 2022

Device discovery: The path to total network visibility

For an organization to prevent cyberattacks, it first needs complete visibility into all...

ADAudit Plus | September 29, 2022

See your estimated ROI when you automate IT audit report generation with ADAudit Plus

In an IT environment, audit reports need to be generated to meet various security and...

[E-book] How to detect and respond to cryptojacking attacks

Log360 | September 26, 2022

[E-book] How to detect and respond to cryptojacking attacks

Did you know that while the world was grappling with the effects of the pandemic,...

How to automate incident response and increase security maturity [Webinar]

Log360 | September 9, 2022

How to automate incident response and increase security maturity [Webinar]

Due to the increase in cyberattacks, security analysts are challenged with multiple...

Security use cases: The key to test the readiness of your SIEM solution

Security Information and Event Management | August 17, 2022

Security use cases: The key to test the readiness of your SIEM solution

Organizations have started considering cybersecurity as a top priority lately. The amount...

Automated incident response using Log360

Log360 | August 4, 2022

Automated incident response using Log360

Security teams are often overwhelmed with alerts daily, including false positives, and...

How to supercharge your SIEM with the MITRE ATT&CK framework [Webinar]

Log360 | July 20, 2022

How to supercharge your SIEM with the MITRE ATT&CK framework [Webinar]

The non-profit organization, MITRE, formulated the Adversarial Tactics, Techniques and...

A security analyst's guide to understanding ransomware: The healthcare edition [E-book]

Log360 | July 19, 2022

A security analyst's guide to understanding ransomware: The healthcare edition [E-book]

If you're an IT security specialist, you're probably familiar with the overwhelming...

Security Information and Event Management | July 5, 2022

Data Privacy Day, Part 2: Overcoming challenges in securing customer information

In part 1 of this series, we discussed data privacy, the related laws, and the data...

How ADAudit Plus helps you assess your exposure to Follina (CVE-2022-30190)

ADAudit Plus | June 13, 2022

How ADAudit Plus helps you assess your exposure to Follina (CVE-2022-30190)

The recently discovered Windows zero-day vulnerability continues to make news as threat...

Page 8 of 29« First«...678910...»Last »