Conquer it with correlation—Part 3: Cryptojacking

In the previous posts of this blog series, we discussed advanced persistent threats and data breaches, highlighting the importance of data security in today’s times. In the...

Log360 3 min read Read

Conquer it with correlation—Part 2: The data breach

In my previous post, we looked at how event correlation can be used to deal with advanced persistent threats (APTs). The thing is, an APT...

Log360 4 min read Read

Conquer it with correlation—Part 1: The advanced persistent threat (APT)

Among all the pesky attacks that keep security administrators working late, advanced persistent threats (APTs) are possibly the most lethal. An APT is a long-term, targeted attack which involves stealthily spying on an organization’s...

Log360 2 min read Read

Webinar: Learn a simple three-step approach to tackling threats

Technology has a lot to offer, from streamlining your business processes to protecting your network, but with all the advantages comes the risk of cyberthreats. Cybercriminals are always developing new...

Log360 1 min read Read

Unravel security incidents using event correlation [Webinar]

Event correlation helps you wrap your head around the countless number of events going on in your organization. Our upcoming webinar, “Unraveling security incidents using event...

Log360 1 min read Read

Webinar: Streamline incident management using SIEM

Organizations deal with several security incidents on a daily basis. Establishing accountability in resolving these incidents is a tough job. From detecting incidents to resolving them,...

Log360 1 min read Read

Contest alert: Take part in the Log360 product pro challenge

We are delighted to announce our “Log360 product pro” challenge, a unique community contest. To participate, all you have to do is answer three simple questions over...

Log360 1 min read Read

Brazil’s Banco Inter data breach shakes fintech industry

In what is perhaps the largest data breach in Brazil in recent times, a hacker group known as John Carter has stolen over 80,000 users’ personal...

Log360 3 min read Read

Six things to consider before choosing a log management solution

Budgeting for IT has always been a problematic topic of discussion when planning an organization’s total budget. Organizations typically want to buy cutting-edge security solutions at the lowest cost possible. But we all know there...

Log360 3 min read Read