Latest Posts

CISO handbook: Cybersecurity metrics, budgeting, and leadership [E-book]

Chief information security officers (CISOs) are the backbone behind the security infrastructure of organizations. They’re pivotal in standing up and winning against the barrage of...

Log360 1 min read Read

Top tips: Four new tech trends to look out for (that aren’t AI)

If you’re anything like me, you’re burnt out by all the hullabaloo surrounding AI lately. It just happens to be one of those trending tech...

General 3 min read Read

El Salvador’s government health care institution delivers exceptional medical services leveraging OpManager

Instituto Salvadoreno del Seguro Social (ISSS), an El Salvador based government health care institution, provides medical services such as treatment, insurance, prescription home delivery, etc....

OpManager 2 min read Read

Happy National DevOps Day! Discover your DevOps personality with our quiz

It’s every DevOps enthusiast’s favorite day of the year again! National DevOps Day is celebrated every year on the 24th of May to spread awareness...

General 1 min read Read

User identity mapping for improved anomaly detection

In any organization, a user may access numerous devices and applications, but not always with the same username or credentials. Devices and applications use platform-specific user...

Log360 2 min read Read

Threat hunting 101: Leveraging MITRE ATT&CK® framework for extended threat detection

Threat detection and mitigation is one of the core responsibilities of a SOC. With cyberattacks becoming more sophisticated, it has become arduous for security analysts...

General , Log360 2 min read Read

Latitude data breach: How one click could cost you everything

Imagine clicking on a seemingly harmless link and unknowingly giving away your personal and financial information to cybercriminals. Sounds like a nightmare, right? This nightmare...

General , IT Security , Log360 2 min read Read

Five worthy reads: The interfused future of AI in cryptocurrencies

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we explore the...

General 4 min read Read

Will predictive AI revolutionize the SIEM industry?

The cybersecurity industry is extremely dynamic and always finds a way to accommodate the latest and best technologies available into its systems. There are two...

IT Security , IT Security 3 min read Read