• Topics
    • Advanced IT analytics
    • Application Performance
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:Log360

Log360 | May 9, 2025

What is DORA and why is it critical for organizations to comply with it?

The Digital Operational Resilience Act (DORA) is a security wake-up call specifically for...

Dark web leaks: Could your business be the next target?

Log360 | March 31, 2025

Dark web leaks: Could your business be the next target?

Imagine this: You're the head of IT at a mid-sized company. You read about a major...

IT Security Under Attack: The ultimate playbook to counter cyberthreats

Log360 | February 26, 2025

IT Security Under Attack: The ultimate playbook to counter cyberthreats

An employee checks their inbox and notices an email from HR with a worrying subject line...

Tips on troubleshooting your network like a pro

Log360 | January 1, 2025

Tips on troubleshooting your network like a pro

Sometimes life can be pointless, and other times, it might just be that your network has...

Bumblebee Malware is back with evolving tactics: How EventLog Analyzer can help protect your organization

Log360 | December 18, 2024

Bumblebee Malware is back with evolving tactics: How EventLog Analyzer can help protect your organization

In a surprising development, Bumblebee Malware (a popular malware downloader) has...

Firewall attacks in history and tips to enhance your firewall security

Log360 | December 16, 2024

Firewall attacks in history and tips to enhance your firewall security

Firewalls are the guardian of your network, effectively blocking unnecessary ports and...

How your favorite apps use protocols: A look at real-world scenarios

Log360 | December 11, 2024

How your favorite apps use protocols: A look at real-world scenarios

Ever wondered how computers and servers talk to each other without descending into...

What is a Secure Socket Layer (SSL)? How does it ensure safe connection?

Log360 | December 2, 2024

What is a Secure Socket Layer (SSL)? How does it ensure safe connection?

Imagine all your online activity being put out in the open—as private as a billboard in...

The role dark web monitoring plays in regulatory compliance

Log360 | October 1, 2024

The role dark web monitoring plays in regulatory compliance

The digital age has transformed industries, but with it comes a complex web of...

Top 10 cybersecurity misconfigurations and how to avoid them

Log360 | September 20, 2024

Top 10 cybersecurity misconfigurations and how to avoid them

Have you ever heard of the 80/20 rule? The 80/20 rule, also known as the Pareto principle...

The HIPAA compliance checklist for security managers

Log360 | September 17, 2024

The HIPAA compliance checklist for security managers

The healthcare sector in the United States has seen a continuous increase in both the...

Dark web monitoring as your early warning system for insider threats

Log360 | July 29, 2024

Dark web monitoring as your early warning system for insider threats

According to the 2023 Insider Threat Report by Cybersecurity Insiders, 74% of...

Page 1 of 10123...»Last »