Did you know that while the world was grappling with the effects of the pandemic, attackers were zealously draining the resources of unsuspecting victims to...
Authentication: The first step towards Zero Trust
Since the onset of the pandemic, Zero Trust has become a common trend. Unlike traditional security authentication architecture, Zero Trust’s “never trust, always verify” philosophy...

How to automate incident response and increase security maturity [Webinar]
Due to the increase in cyberattacks, security analysts are challenged with multiple alerts every few seconds. It’s a daunting task to not only identify which...

Top five security recommendations for Microsoft 365
When the pandemic hit, organizations around the world shifted their infrastructure to cloud or hybrid models, as working from home (completely or partially) became the...
Cyber insurance: Here’s why you need it
With the alarming increase in cyberattacks across the globe, it is becoming evident that no organization is immune to cyberthreats. As a result, there is...

Automated incident response using Log360
Security teams are often overwhelmed with alerts daily, including false positives, and actions that require attention but might be placed on the back burner. But...