Log360 | July 27, 2018Webinar: Streamline incident management using SIEM Organizations deal with several security incidents on a daily basis. Establishing...
Log360 | June 25, 2018Contest alert: Take part in the Log360 product pro challenge We are delighted to announce our "Log360 product pro" challenge, a unique community...
Log360 | May 10, 2018Brazil's Banco Inter data breach shakes fintech industry In what is perhaps the largest data breach in Brazil in recent times, a hacker group known...
IT Security | April 27, 2018Ransomware attacks continue to rise in 2018 It's official. Ransomware isn't just one of the most common types of malware, it is the...
IT Security | April 26, 2018Train to be a SIEM scholar with our Log360 certification program Starting April 25th, we're hosting a free, four-part training program on security...
EventLog Analyzer | April 24, 2018Connecting the logs with event correlation Starting with the basics Security information and event management (SIEM) helps with...
EventLog Analyzer | March 13, 2018Talk to our experts about the essentials of log management Log management is a pillar of security information and event management (SIEM), and is...
IT Security | March 2, 2018Gold Lowell uses SamSam ransomware to terrorize SMBs From late December 2017 to mid January 2018, several small and medium businesses found...
IT Security | February 13, 2018Ransomware attackers and victims fall victim to ransom theft Recently, there has been a string of attacks affecting some ransomware victims who pay...
EventLog Analyzer | January 31, 2018Let's talk about STIX, TAXII, and threat intelligence In terms of collaboration, Structured Threat Information eXpression (STIX) and Trusted...
Log360 | July 18, 2017The case for incident management in a SIEM system Log360's latest incident management system is the perfect bridge between your incident...