How to automate incident response and increase security maturity [Webinar]

Due to the increase in cyberattacks, security analysts are challenged with multiple alerts every few seconds. It’s a daunting task to not only identify which...

Log360 2 min read Read

Top five security recommendations for Microsoft 365

When the pandemic hit, organizations around the world shifted their infrastructure to cloud or hybrid models, as working from home (completely or partially) became the...

M365 Manager Plus 2 min read Read

Cyber insurance: Here’s why you need it

With the alarming increase in cyberattacks across the globe, it is becoming evident that no organization is immune to cyberthreats. As a result, there is...

AD360 3 min read Read

Automated incident response using Log360

Security teams are often overwhelmed with alerts daily, including false positives, and actions that require attention but might be placed on the back burner. But...

Log360 3 min read Read

Lightweight Directory Access Protocol (LDAP) decoded for beginners

If you are a beginner on your Active Directory (AD) learning journey, then you must have stumbled upon the term LDAP. It’s quite possible that...

Active Directory 3 min read Read

A practical approach to Active Directory Domain Services, Part 10: A study into Group Policies and AD

We have covered a plethora of topics on Active Directory (AD) in parts one to nine of this series on Active Directory Domain Services.  In...

Active Directory 4 min read Read

Active Directory sites in a nutshell

An Active Directory (AD) environment has things like forests, trees, domains, organization units, and objects. After growing acquainted with these concepts, the next step on...

Active Directory 4 min read Read

A practical approach to Active Directory Domain Services, Part 9: An AD reality check

Have you looked into some of the most well-known Active Directory (AD) attacks from around the world? Do you understand the nuances of these popular...

Active Directory 5 min read Read

How to supercharge your SIEM with the MITRE ATT&CK framework [Webinar]

The non-profit organization, MITRE, formulated the Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) framework in 2013 to help organizations understand the attack pattern of threat actors....

Log360 2 min read Read