Log360 | October 6, 2022[Webinar] The top-five correlation rules to master threat detection in your network Correlating events to identify if they are part of a larger incident or attack is one of...
Log360 | October 3, 2022Device discovery: The path to total network visibility For an organization to prevent cyberattacks, it first needs complete visibility into all...
Log360 | September 26, 2022[E-book] How to detect and respond to cryptojacking attacks Did you know that while the world was grappling with the effects of the pandemic,...
Log360 | September 9, 2022How to automate incident response and increase security maturity [Webinar] Due to the increase in cyberattacks, security analysts are challenged with multiple...
Log360 | July 20, 2022How to supercharge your SIEM with the MITRE ATT&CK framework [Webinar] The non-profit organization, MITRE, formulated the Adversarial Tactics, Techniques and...
Log360 | July 19, 2022A security analyst's guide to understanding ransomware: The healthcare edition [E-book] If you're an IT security specialist, you're probably familiar with the overwhelming...
Log360 | June 9, 2022Establishing a least privilege environment in healthcare organizations [E-book] Did you know that by selling a single health record on the dark web, an attacker can get...
Log360 | April 6, 2022The handbook that every cybersecurity analyst needs [E-book] The IT industry recognizes the drastic increase in cyberattacks in the past few years....
Log360 | March 31, 20224 golden reasons for equipping your SOC with ManageEngine Log360 Cyberattacks are fast becoming a part of our daily lives. MultipleĀ sources such as Norton...
Log360 | March 3, 2022Anomaly Detection In Cybersecurity For Dummies [E-book] If you are a cybersecurity professional, you must be aware that cyberattacks, especially...