Log360 | March 3, 2021Security operations center, Part 3: Finding your weakest link Any organization with data assets is a possible target for an attacker. Hackers use...
General | October 21, 2020Sophisticated phishing Most of us can think of a time when we received a phishing email. In fact, most phishing...
Log360 | August 12, 20205 tips to avoid cyberattacks on EdTech platforms As the COVID-19 pandemic rages on, many educational institutions have been forced to shift...
Security Information and Event Management | July 21, 2020Security operations center, Part 1: The guardian of your organization Hacking is finding a way to accomplish a goal, never accepting no for an answer, and being...