• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:Security Information and Event Management

Log360 | May 9, 2025

What is DORA and why is it critical for organizations to comply with it?

The Digital Operational Resilience Act (DORA) is a security wake-up call specifically for...

Dark web leaks: Could your business be the next target?

Log360 | March 31, 2025

Dark web leaks: Could your business be the next target?

Imagine this: You're the head of IT at a mid-sized company. You read about a major...

Top tips: 5 potential use cases of 6G networks

DataSecurity Plus | March 6, 2025

Top tips: 5 potential use cases of 6G networks

Top tips is a weekly column where we highlight what’s trending in the tech world and list...

IT Security Under Attack: The ultimate playbook to counter cyberthreats

Log360 | February 26, 2025

IT Security Under Attack: The ultimate playbook to counter cyberthreats

An employee checks their inbox and notices an email from HR with a worrying subject line...

Tips on troubleshooting your network like a pro

Log360 | January 1, 2025

Tips on troubleshooting your network like a pro

Sometimes life can be pointless, and other times, it might just be that your network has...

Bumblebee Malware is back with evolving tactics: How EventLog Analyzer can help protect your organization

Log360 | December 18, 2024

Bumblebee Malware is back with evolving tactics: How EventLog Analyzer can help protect your organization

In a surprising development, Bumblebee Malware (a popular malware downloader) has...

Firewall attacks in history and tips to enhance your firewall security

Log360 | December 16, 2024

Firewall attacks in history and tips to enhance your firewall security

Firewalls are the guardian of your network, effectively blocking unnecessary ports and...

How your favorite apps use protocols: A look at real-world scenarios

Log360 | December 11, 2024

How your favorite apps use protocols: A look at real-world scenarios

Ever wondered how computers and servers talk to each other without descending into...

How to adapt firewall rules for medical device security in healthcare

Firewall Analyzer | December 10, 2024

How to adapt firewall rules for medical device security in healthcare

Healthcare has become more digitized; medical devices play an increasingly vital role in...

What is a Secure Socket Layer (SSL)? How does it ensure safe connection?

Log360 | December 2, 2024

What is a Secure Socket Layer (SSL)? How does it ensure safe connection?

Imagine all your online activity being put out in the open—as private as a billboard in...

The states of data, Part 3: Data in use and why you need to keep an eye on file activities

DataSecurity Plus | October 8, 2024

The states of data, Part 3: Data in use and why you need to keep an eye on file activities

In our previous blog, The states of data, Part 2: Why visibility is key for protecting...

The role dark web monitoring plays in regulatory compliance

Log360 | October 1, 2024

The role dark web monitoring plays in regulatory compliance

The digital age has transformed industries, but with it comes a complex web of...

Page 1 of 28123...»Last »