• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Log360 / Blog

ManageEngine Recognized as a Customers' Choice in 2023 Gartner® Peer Insights 'Voice of the Customer': Security Information and Event Management (SIEM) for the fourth time

Log360 | August 1, 2023

ManageEngine Recognized as a Customers' Choice in 2023 Gartner® Peer Insights 'Voice of the Customer': Security Information and Event Management (SIEM) for the fourth time

We're thrilled to announce that ManageEngine has once again been recognized as a...

Comprehensive visibility is the foundation for effective threat detection and response

Log360 | July 27, 2023

Comprehensive visibility is the foundation for effective threat detection and response

Businesses today are more dependent than ever on technology, making strong threat...

Breaking down India's cybersecurity: A comprehensive mid-year review and analysis

Log360 | July 25, 2023

Breaking down India's cybersecurity: A comprehensive mid-year review and analysis

As we cross the halfway mark of this year, we need to evaluate and understand the rising...

[Webinar] How to implement an effective data loss prevention strategy

Log360 | July 10, 2023

[Webinar] How to implement an effective data loss prevention strategy

Data is your organization's lifeblood. Ensuring it doesn't fall into the wrong hands must...

[Webinar] How to measure the effectiveness of your security operations center

Log360 | June 5, 2023

[Webinar] How to measure the effectiveness of your security operations center

Network visibility is the first step towards security. You need to know what activities...

CISO handbook: Cybersecurity metrics, budgeting, and leadership [E-book]

Log360 | May 26, 2023

CISO handbook: Cybersecurity metrics, budgeting, and leadership [E-book]

Chief information security officers (CISOs) are the backbone behind the security...

User identity mapping for improved anomaly detection

Log360 | May 22, 2023

User identity mapping for improved anomaly detection

In any organization, a user may access numerous devices and applications, but not always...

Log360 | May 19, 2023

Threat hunting 101: Leveraging the MITRE ATT&CK® framework for extended threat detection

Threat detection and mitigation is one of the core responsibilities of a SOC. With...

Log360 | May 10, 2023

Discover how attackers exploit DNS vulnerabilities in Active Directory

A DNS server is an integral part of an AD environment. Simple yet crucial activities are...

[Webinar] How to build a team to run your SOC and SIEM

Log360 | May 8, 2023

[Webinar] How to build a team to run your SOC and SIEM

Setting up the required defenses against cyberattacks is high on every organization's...

How to comply with ISO 27001:2022 security controls using SIEM

Log360 | April 17, 2023

How to comply with ISO 27001:2022 security controls using SIEM

When it comes to compliance, all enterprises struggle to keep up with the latest versions...

[Webinar] The evolution of AI and ML in cybersecurity

Log360 | April 5, 2023

[Webinar] The evolution of AI and ML in cybersecurity

Artificial intelligence (AI) and machine learning (ML) are critical components of any...

Page 3 of 10«12345...»Last »