IT Security - Cloud | November 28, 20225 advantages of deploying a cloud SIEM solution As organizations are rapidly moving to the cloud to leverage the cloud advantage, services...
Security Information and Event Management | July 5, 2022Data Privacy Day, Part 2: Overcoming challenges in securing customer information In part 1 of this series, we discussed data privacy, the related laws, and the data...
Security Information and Event Management | January 27, 2022Data Privacy Day, Part 1: What you need to know about data privacy Data Privacy Day (known in Europe as Data Protection Day) is an international event aimed...
IT Security | October 5, 202113 reasons Log360 is the SIEM solution for you: Part 2 Read the first part here. #8: You get a state-of-the-art compliance management tool Our...
IT Security | October 4, 202113 reasons Log360 is the SIEM solution for you: Part 1 There are plenty of security information and event management (SIEM) solutions on the...
Security Information and Event Management | September 23, 2020Are you listening to your logs? Part 4: Open ports Did you know that an organization with more open ports is more vulnerable to data breaches...
Security Information and Event Management | September 15, 2020Are you listening to your logs? Part 3: High disk usage In the previous blog of this series, we saw how server crashes can be avoided by detecting...
Security Information and Event Management | August 26, 2020Are you listening to your logs? Part 2: Low disk space In the first part of this blog series, we saw how monitoring slow server response times in...
Security Information and Event Management | August 6, 2020Are you listening to your logs? Part 1: Slow server response Loading… Is there a more uninspiring word to encounter while browsing the internet? When a...