Conquer it with correlation—Part 2: The data breach

In my previous post, we looked at how event correlation can be used to deal with advanced persistent threats (APTs). The thing is, an APT is just one ugly face of a much larger epidemic: the data breach. In …

Log360 4 min read

Conquer it with correlation—Part 1: The advanced persistent threat (APT)

Among all the pesky attacks that keep security administrators working late, advanced persistent threats (APTs) are possibly the most lethal. An APT is a long-term, targeted attack which involves stealthily spying on an organization’s network activity or siphoning off sensitive …

Log360 2 min read

Webinar: Learn a simple three-step approach to tackling threats

Technology has a lot to offer, from streamlining your business processes to protecting your network, but with all the advantages comes the risk of cyberthreats. Cybercriminals are always developing new methods to breach networks, which means organizations are more susceptible …

Log360 1 min read

Unravel security incidents using event correlation [Webinar]

Event correlation helps you wrap your head around the countless number of events going on in your organization. Our upcoming webinar, “Unraveling security incidents using event correlation,” is all about the power of event correlation. Join us on August …

Log360 1 min read

Webinar: Streamline incident management using SIEM

Organizations deal with several security incidents on a daily basis. Establishing accountability in resolving these incidents is a tough job. From detecting incidents to resolving them, you need a proper incident management system that will not only ensure accountability but …

Log360 1 min read

Contest alert: Take part in the Log360 product pro challenge

We are delighted to announce our “Log360 product pro” challenge, a unique community contest. To participate, all you have to do is answer three simple questions over on our forum, and you could win a $25 Amazon gift card.

Over …

Log360 1 min read

Brazil’s Banco Inter data breach shakes fintech industry

In what is perhaps the largest data breach in Brazil in recent times, a hacker group known as John Carter has stolen over 80,000 users’ personal data from Banco Inter, one of Brazil’s biggest all-digital banks. The variety of stolen …

Log360 3 min read

Six things to consider before choosing a log management solution

Budgeting for IT has always been a problematic topic of discussion when planning an organization’s total budget. Organizations typically want to buy cutting-edge security solutions at the lowest cost possible. But we all know there is no such thing as …

Log360 3 min read

Adopting a SIEM solution? Here’s what you need to know

Cyberattacks have become an everyday affair, especially with the WannaCry attack and EquiFax breach making headline news recently. You might be asking yourself why cyberattacks have become more common. Is it because of loosened security policies or sophisticated attack methodologies? …

Log360 3 min read

The case for incident management in a SIEM system

Log360‘s latest incident management system is the perfect bridge between your incident detection and response processes. The feature comes in handy for security administrators and the various agents who investigate and resolve security issues.

Imagine you’re the security administrator …

Log360 2 min read