• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Log360 / Blog

Native SOAR in Log360 Cloud: Closing the gap between detection and response

Log360 | May 20, 2026

Native SOAR in Log360 Cloud: Closing the gap between detection and response

Security teams today don’t struggle because they lack visibility. They struggle because...

5 high-fidelity detections that cut through SOC alert fatigue

Log360 | March 3, 2026

5 high-fidelity detections that cut through SOC alert fatigue

Security teams deal with an endless stream of logs, and the volume alone makes it...

Automating VPN threat detection and responses with ManageEngine Log360

Log360 | December 22, 2025

Automating VPN threat detection and responses with ManageEngine Log360

In a world where hybrid work is the norm, VPNs are the lifeline connecting employees to...

Log everything from anywhere: Centralizing log collection with Log360

Log360 | November 14, 2025

Log everything from anywhere: Centralizing log collection with Log360

In today's complex IT environments, comprehensive log collection is crucial for effective...

Top cyberattacks from the last six months: A deep dive into the digital battlefield

Log360 | August 5, 2025

Top cyberattacks from the last six months: A deep dive into the digital battlefield

Cyberattacks today have become sophisticated digital disasters, capable of disrupting...

Securing Windows services and Windows security logs

Log360 | July 14, 2025

Securing Windows services and Windows security logs

Our IT security under attack campaign has been a continuous effort to help you verify and...

Top 5 alternatives to Splunk in 2025: Smarter choices for smarter security

Log360 | June 2, 2025

Top 5 alternatives to Splunk in 2025: Smarter choices for smarter security

The security information and event management (SIEM) space is evolving fast in 2025.When...

Log360 | May 9, 2025

What is DORA and why is it critical for organizations to comply with it?

The Digital Operational Resilience Act (DORA) is a security wake-up call specifically for...

Dark web leaks: Could your business be the next target?

Log360 | March 31, 2025

Dark web leaks: Could your business be the next target?

Imagine this: You're the head of IT at a mid-sized company. You read about a major...

IT Security Under Attack: The ultimate playbook to counter cyberthreats

Log360 | February 26, 2025

IT Security Under Attack: The ultimate playbook to counter cyberthreats

An employee checks their inbox and notices an email from HR with a worrying subject line...

Tips on troubleshooting your network like a pro

Log360 | January 1, 2025

Tips on troubleshooting your network like a pro

Sometimes life can be pointless, and other times, it might just be that your network has...

Bumblebee Malware is back with evolving tactics: How EventLog Analyzer can help protect your organization

Log360 | December 18, 2024

Bumblebee Malware is back with evolving tactics: How EventLog Analyzer can help protect your organization

In a surprising development, Bumblebee Malware (a popular malware downloader) has...

Page 1 of 10123...»Last »