Data poisoning: Prevention strategies to keep your data safe

The amount of data generated and fed into AI systems has increased quickly over the last few years. Attackers are taking advantage of the massive...

Log360 4 min read Read

Protecting your SDLC from a supply chain attack

Did you know that nine out of 10 companies detected software supply chain risks in the past 12 months? The increase in the number of...

Log360 4 min read Read

How to improve risk scoring and threat detection with UEBA [Free e-book]

Did you know that in 2022, the mean time to detect a breach was as many as 207 days? It’s crucial for organizations to detect and...

Log360 1 min read Read

Windows Defender Firewall misconfigurations and GPOs: Connecting the dots

Many enterprises have a variety of aspects that make up their networks, like Windows Defender Firewall, GPOs, and an AD infrastructure. Vulnerabilities in any part of...

Active Directory , AD360 , Log360 3 min read Read

Cybersecurity KPI metrics that CISOs should track

It’s important for chief information security officers (CISOs) to track certain metrics to gauge the efficiency of their SOC, and to see how effectively they’ve achieved...

Log360 2 min read Read

Staying ahead of LockBit ransomware attacks

  LockBit is a Ransomware as a Service (RaaS) provider accountable for most LockBit ransomware attacks in 2023. The LockBit RaaS group came into existence in 2019 and...

Log360 3 min read Read

[Webinar] How to bolster cybersecurity by gaining complete network visibility

To prevent cyberattacks, you need complete visibility into all the events that occur within your network. Only then can you analyze the risky behavior of...

Log360 1 min read Read

ManageEngine Recognized as a Customers’ Choice in 2023 Gartner® Peer Insights ‘Voice of the Customer’: Security Information and Event Management (SIEM) for the fourth time

We’re thrilled to announce that ManageEngine has once again been recognized as a Customers’ Choice in the 2023 Gartner Peer Insights ‘Voice of the Customer’: Security Information...

Log360 3 min read Read

Comprehensive visibility is the foundation for effective threat detection and response

Businesses today are more dependent than ever on technology, making strong threat detection and response strategies essential. Cybercriminals in the modern world are constantly looking for...

Log360 3 min read Read