• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:Log360

How to supercharge your SIEM with the MITRE ATT&CK framework [Webinar]

Log360 | July 20, 2022

How to supercharge your SIEM with the MITRE ATT&CK framework [Webinar]

The non-profit organization, MITRE, formulated the Adversarial Tactics, Techniques and...

A security analyst's guide to understanding ransomware: The healthcare edition [E-book]

Log360 | July 19, 2022

A security analyst's guide to understanding ransomware: The healthcare edition [E-book]

If you're an IT security specialist, you're probably familiar with the overwhelming...

Establishing a least privilege environment in healthcare organizations [E-book]

Log360 | June 9, 2022

Establishing a least privilege environment in healthcare organizations [E-book]

Did you know that by selling a single health record on the dark web, an attacker can get...

The handbook that every cybersecurity analyst needs [E-book]

Log360 | April 6, 2022

The handbook that every cybersecurity analyst needs [E-book]

The IT industry recognizes the drastic increase in cyberattacks in the past few years....

4 golden reasons for equipping your SOC with ManageEngine Log360

Log360 | March 31, 2022

4 golden reasons for equipping your SOC with ManageEngine Log360

Cyberattacks are fast becoming a part of our daily lives. Multiple sources such as Norton...

Anomaly Detection In Cybersecurity For Dummies [E-book]

Log360 | March 3, 2022

Anomaly Detection In Cybersecurity For Dummies [E-book]

If you are a cybersecurity professional, you must be aware that cyberattacks, especially...

[Free online guide] Critical Windows event IDs and security use cases to monitor

Log360 | December 7, 2021

[Free online guide] Critical Windows event IDs and security use cases to monitor

According to Statcounter, 75.18% of servers across the globe use a Windows operating...

Log360 | October 29, 2021

13 spooky security threats that happened in 2021

Alan is one of the senior officers of a financial bank in Texas. Alan was looking to buy a...

Log360 | September 9, 2021

How Kaseya fell victim to a ransomware attack

On July 2, 2021, the cybersecurity world woke up to yet another ransomware attack—this...

The role of endpoints in the security of your network

Log360 | June 21, 2021

The role of endpoints in the security of your network

Endpoint security is a hot topic of discussion, especially now with so many businesses...

Building a complete network security checklist

Log360 | May 24, 2021

Building a complete network security checklist

Understanding what to audit in a network can be chaotic and confusing. Building a complete...

Azure security 101: Security essentials, logs, authentication, and more

Log360 | March 30, 2021

Azure security 101: Security essentials, logs, authentication, and more

“Where necessity speaks, it demands”. This old saying seems particularly apt right now...

Page 5 of 347« First«...34567...»Last »