• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

IT Security | August 27, 2018

Simplifying security auditing, Part 3: Keeping insider threats in check 

Insider threats are on the rise. In fact, both administrators and average employees are...

IT Security | August 15, 2018

Simplifying security auditing, Part 1: Regularly reviewing server activity 

Everyone knows about the importance of log management in IT security. Yet, organizations...

IT Security | July 23, 2018

Network breach at Australian National University serves as a reminder about the Notifiable Data Breaches scheme 

Earlier this month, several news outlets reported that Australian National University's ...

IT Security | July 20, 2018

How to leverage SIEM to meet the GDPR's requirements

Today's businesses run on data. From getting customer information for payment, processing...

IT Security | June 6, 2018

Adopting a SIEM solution, Part 1: Why choose SIEM?

Security threats are on the rise and hackers' attack methods are becoming more...

IT Security | May 17, 2018

Free webinar on setting up critical security alerts in your environment 

Every security team relies on security alerts as indicators of compromise (IOCs)....

IT Security | April 27, 2018

Ransomware attacks continue to rise in 2018

It's official. Ransomware isn't just one of the most common types of malware, it is the...

Train to be a SIEM scholar with our Log360 certification program

IT Security | April 26, 2018

Train to be a SIEM scholar with our Log360 certification program

Starting April 25th, we're hosting a free, four-part training program on security...

IT Security | April 18, 2018

Reporting on and auditing your Office 365 environment

Migrating to Office 365 can seem like an immense task, but making the switch itself is...

GDPR prep steps—Part 1

IT Security | March 16, 2018

GDPR prep steps—Part 1

The deadline for the General Data Protection Regulation (GDPR) is looming closer. Are you...

Gold Lowell uses SamSam ransomware to terrorize SMBs

IT Security | March 2, 2018

Gold Lowell uses SamSam ransomware to terrorize SMBs

From late December 2017 to mid January 2018, several small and medium businesses found...

IT Security | February 16, 2018

How to prioritize your top security alerts for better SIEM

Receiving alerts when a critical event occurs is the first step in responding to a...

Page 5 of 8« First«...34567...»Last »