• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:IT Security

The Log360 security platform: Thinking outside the logs

IT Security | March 5, 2025

The Log360 security platform: Thinking outside the logs

We're excited to announce the evolution of our SIEM solution, Log360, into a unified...

Cybersecurity forecast: Top CIOs reveal their biggest fears and plans

IT Security | August 13, 2024

Cybersecurity forecast: Top CIOs reveal their biggest fears and plans

Did you know that 79% of top CIOs believe AI-driven cyberattacks will be the most...

IT Security | January 25, 2024

Understanding the Okta supply chain attack of 2023: A comprehensive analysis

In October 2023, Okta, a leading provider of identity and access management (IAM)...

Adopting the 5S strategy in cybersecurity

IT Security | August 21, 2023

Adopting the 5S strategy in cybersecurity

The 5S strategy has long been considered a reliable approach to workplace organization....

MOVEit mayhem: Attackers found, patch released, but no end in sight

IT Security | June 28, 2023

MOVEit mayhem: Attackers found, patch released, but no end in sight

The entire cybersecurity realm is buzzing over zero-day vulnerabilities and SQL injection...

Unravelling the TDIR framework: Conception, evolution, and categorization

IT Security | May 31, 2023

Unravelling the TDIR framework: Conception, evolution, and categorization

Cybersecurity is a mix of both reactive and proactive approaches. In the past,...

Latitude data breach: How one click could cost you everything

IT Security | May 19, 2023

Latitude data breach: How one click could cost you everything

Imagine clicking on a seemingly harmless link and unknowingly giving away your personal...

3 examples of organizations that could have benefited from a CASB

IT Security | August 19, 2022

3 examples of organizations that could have benefited from a CASB

In recent times, the widespread use of cloud services has become common for most...

Cybersecurity compliance: Time to clean up the cobwebs

IT Security | July 22, 2022

Cybersecurity compliance: Time to clean up the cobwebs

Cybersecurity compliance became prominent in the last decade. From being a trivial part...

Clearing the air over the new CERT-In rules

IT Security | July 4, 2022

Clearing the air over the new CERT-In rules

Authorities that lay down compliance regulations often update them in order to keep them...

Cyber risk score: Learn how to quantify your organization's cyber resilience

IT Security | May 27, 2022

Cyber risk score: Learn how to quantify your organization's cyber resilience

Imagine you're applying for a loan. One of the important criteria required to obtain...

7 vital security tips for enterprise cloud security administrators

IT Security | March 23, 2022

7 vital security tips for enterprise cloud security administrators

Every organization has tons of sensitive information stored in the cloud. The...

Page 1 of 7123...»Last »