User identity mapping for improved anomaly detection

In any organization, a user may access numerous devices and applications, but not always with the same username or credentials. Devices and applications use platform-specific user...

Log360 2 min read Read

Threat hunting 101: Leveraging the MITRE ATT&CK® framework for extended threat detection

Threat detection and mitigation is one of the core responsibilities of a SOC. With cyberattacks becoming more sophisticated, it has become arduous for security analysts...

General , Log360 2 min read Read

Latitude data breach: How one click could cost you everything

Imagine clicking on a seemingly harmless link and unknowingly giving away your personal and financial information to cybercriminals. Sounds like a nightmare, right? This nightmare...

General , IT Security , Log360 2 min read Read

Discover how attackers exploit DNS vulnerabilities in Active Directory

A DNS server is an integral part of an AD environment. Simple yet crucial activities are accomplished using DNS servers, such as authenticating, searching for...

General , Log360 3 min read Read

[Webinar] How to build a team to run your SOC and SIEM

Setting up the required defenses against cyberattacks is high on every organization’s list of priorities. They are no longer debating whether they should invest in...

Log360 2 min read Read

How to comply with ISO 27001:2022 security controls using SIEM

When it comes to compliance, all enterprises struggle to keep up with the latest versions of regulatory standards. On October 25, 2022, the newest ISO...

General , Log360 2 min read Read

[Webinar] The evolution of AI and ML in cybersecurity

Artificial intelligence (AI) and machine learning (ML) are critical components of any mature cybersecurity program. A prime example of this is user and behavior entity...

Log360 2 min read Read

Segurança da nuvem: nosso prognóstico para 2023

A tecnologia de nuvem está sendo cada vez mais usada devido à sua escalabilidade e eficiência, tornando-a uma escolha popular para empresas de todos os...

Log360 , Portugues 3 min read Read

[Webinar] Singapore’s Zero Trust policy and what we can learn from it

In today’s world, cyber espionage and cyberwarfare, are becoming increasingly frequent. Contracted by nation-states, threat actors attack rival nations to destabilize their government, economy, or...

Log360 1 min read Read