IT Security | March 5, 2025The Log360 security platform: Thinking outside the logs We're excited to announce the evolution of our SIEM solution, Log360, into a unified...
IT Security | August 21, 2023Adopting the 5S strategy in cybersecurity The 5S strategy has long been considered a reliable approach to workplace organization....
IT Security | May 31, 2023Unravelling the TDIR framework: Conception, evolution, and categorization Cybersecurity is a mix of both reactive and proactive approaches. In the past,...
Log360 | May 19, 2023Threat hunting 101: Leveraging the MITRE ATT&CK® framework for extended threat detection Threat detection and mitigation is one of the core responsibilities of a SOC. With...
Security Information and Event Management | May 18, 2023Will predictive AI revolutionize the SIEM industry? The cybersecurity industry is extremely dynamic and always finds a way to accommodate the...
Security Information and Event Management | March 17, 2023Inside the mind of a hacker: Alternate identities and varied behavioral patterns The boom of information technology opened an entirely new world of identities and...
Log360 | January 4, 2023The impact of cyber fouling and how scavengers might capitalize on it The cyber landscape is ever-evolving. Organizations have started moving their resources...
Security Information and Event Management | October 10, 20227 key features of SIEM that every enterprise administrator should be aware of A SIEM solution has become an integral part of an organization's security arsenal. But...
Security Information and Event Management | August 17, 2022Security use cases: The key to test the readiness of your SIEM solution Organizations have started considering cybersecurity as a top priority lately. The amount...
IT Security | July 22, 2022Cybersecurity compliance: Time to clean up the cobwebs Cybersecurity compliance became prominent in the last decade. From being a trivial part...
IT Security | July 4, 2022Clearing the air over the new CERT-In rules Authorities that lay down compliance regulations often update them in order to keep them...
IT Security | May 27, 2022Cyber risk score: Learn how to quantify your organization's cyber resilience Imagine you're applying for a loan. One of the important criteria required to obtain...