• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:Security Information and Event Management

What is a Secure Socket Layer (SSL)? How does it ensure safe connection?

Log360 | December 2, 2024

What is a Secure Socket Layer (SSL)? How does it ensure safe connection?

Imagine all your online activity being put out in the open—as private as a billboard in...

The states of data, Part 3: Data in use and why you need to keep an eye on file activities

DataSecurity Plus | October 8, 2024

The states of data, Part 3: Data in use and why you need to keep an eye on file activities

In our previous blog, The states of data, Part 2: Why visibility is key for protecting...

The role dark web monitoring plays in regulatory compliance

Log360 | October 1, 2024

The role dark web monitoring plays in regulatory compliance

The digital age has transformed industries, but with it comes a complex web of...

Top 10 cybersecurity misconfigurations and how to avoid them

Log360 | September 20, 2024

Top 10 cybersecurity misconfigurations and how to avoid them

Have you ever heard of the 80/20 rule? The 80/20 rule, also known as the Pareto principle...

The states of data, Part 1: Why you should protect data at rest, in use, and in motion

DataSecurity Plus | September 17, 2024

The states of data, Part 1: Why you should protect data at rest, in use, and in motion

What do Morgan Stanley, Samsung, and a New York credit union all have in common? They...

The HIPAA compliance checklist for security managers

Log360 | September 17, 2024

The HIPAA compliance checklist for security managers

The healthcare sector in the United States has seen a continuous increase in both the...

7 firewall management best practices in 2024

Firewall Analyzer | September 13, 2024

7 firewall management best practices in 2024

Firewalls act as the first line of defense, filtering network traffic and blocking...

Enhance network security: 6 key steps for an effective firewall rule audit

Firewall Analyzer | September 4, 2024

Enhance network security: 6 key steps for an effective firewall rule audit

A firewall rule audit is an essential process for ensuring that your firewall rules are...

Data classification: The fundamental requirement of successful DLP programs

DataSecurity Plus | September 3, 2024

Data classification: The fundamental requirement of successful DLP programs

The way we store data has undergone a dramatic shift. From good ol' floppy disks   to...

Strengthening your defenses: Aligning Firewall Analyzer with the new PCI DSS v4.0 standards

Firewall Analyzer | August 19, 2024

Strengthening your defenses: Aligning Firewall Analyzer with the new PCI DSS v4.0 standards

According to IBM's 2023 Cost of a Data Breach Report, the global average cost of a data...

Leverage GSMA compliance to drive secure firewall configurations with Firewall Analyzer

Firewall Analyzer | August 14, 2024

Leverage GSMA compliance to drive secure firewall configurations with Firewall Analyzer

The GSM Association, which stands for the Global System for Mobile Communications...

Dark web monitoring as your early warning system for insider threats

Log360 | July 29, 2024

Dark web monitoring as your early warning system for insider threats

According to the 2023 Insider Threat Report by Cybersecurity Insiders, 74% of...

Page 2 of 28«1234...»Last »