• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:Security Information and Event Management

Top cyberattacks from the last six months: A deep dive into the digital battlefield

Log360 | August 5, 2025

Top cyberattacks from the last six months: A deep dive into the digital battlefield

Cyberattacks today have become sophisticated digital disasters, capable of disrupting...

Securing Windows services and Windows security logs

Log360 | July 14, 2025

Securing Windows services and Windows security logs

Our IT security under attack campaign has been a continuous effort to help you verify and...

dMSA abuse (BadSuccessor) enables privilege escalation: Monitor critical attribute changes with ADAudit Plus

ADAudit Plus | June 6, 2025

dMSA abuse (BadSuccessor) enables privilege escalation: Monitor critical attribute changes with ADAudit Plus

A critical vulnerability, dubbed BadSuccessor, has been identified in Windows Server 2025....

Top 5 alternatives to Splunk in 2025: Smarter choices for smarter security

Log360 | June 2, 2025

Top 5 alternatives to Splunk in 2025: Smarter choices for smarter security

The security information and event management (SIEM) space is evolving fast in 2025.When...

The Change Healthcare hack wasn’t just a breach—it was a wake-up call

DataSecurity Plus | May 26, 2025

The Change Healthcare hack wasn’t just a breach—it was a wake-up call

"The US healthcare system is broken" is not an uncommon phrase. With no universal...

Log360 | May 9, 2025

What is DORA and why is it critical for organizations to comply with it?

The Digital Operational Resilience Act (DORA) is a security wake-up call specifically for...

Dark web leaks: Could your business be the next target?

Log360 | March 31, 2025

Dark web leaks: Could your business be the next target?

Imagine this: You're the head of IT at a mid-sized company. You read about a major...

Top tips: 5 potential use cases of 6G networks

DataSecurity Plus | March 6, 2025

Top tips: 5 potential use cases of 6G networks

Top tips is a weekly column where we highlight what’s trending in the tech world and list...

IT Security Under Attack: The ultimate playbook to counter cyberthreats

Log360 | February 26, 2025

IT Security Under Attack: The ultimate playbook to counter cyberthreats

An employee checks their inbox and notices an email from HR with a worrying subject line...

Tips on troubleshooting your network like a pro

Log360 | January 1, 2025

Tips on troubleshooting your network like a pro

Sometimes life can be pointless, and other times, it might just be that your network has...

Bumblebee Malware is back with evolving tactics: How EventLog Analyzer can help protect your organization

Log360 | December 18, 2024

Bumblebee Malware is back with evolving tactics: How EventLog Analyzer can help protect your organization

In a surprising development, Bumblebee Malware (a popular malware downloader) has...

Firewall attacks in history and tips to enhance your firewall security

Log360 | December 16, 2024

Firewall attacks in history and tips to enhance your firewall security

Firewalls are the guardian of your network, effectively blocking unnecessary ports and...

Page 1 of 28123...»Last »