• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

Firewall attacks in history and tips to enhance your firewall security

Log360 | December 16, 2024

Firewall attacks in history and tips to enhance your firewall security

Firewalls are the guardian of your network, effectively blocking unnecessary ports and...

How your favorite apps use protocols: A look at real-world scenarios

Log360 | December 11, 2024

How your favorite apps use protocols: A look at real-world scenarios

Ever wondered how computers and servers talk to each other without descending into...

How to adapt firewall rules for medical device security in healthcare

Firewall Analyzer | December 10, 2024

How to adapt firewall rules for medical device security in healthcare

Healthcare has become more digitized; medical devices play an increasingly vital role in...

What is a Secure Socket Layer (SSL)? How does it ensure safe connection?

Log360 | December 2, 2024

What is a Secure Socket Layer (SSL)? How does it ensure safe connection?

Imagine all your online activity being put out in the open—as private as a billboard in...

The states of data, Part 3: Data in use and why you need to keep an eye on file activities

DataSecurity Plus | October 8, 2024

The states of data, Part 3: Data in use and why you need to keep an eye on file activities

In our previous blog, The states of data, Part 2: Why visibility is key for protecting...

The role dark web monitoring plays in regulatory compliance

Log360 | October 1, 2024

The role dark web monitoring plays in regulatory compliance

The digital age has transformed industries, but with it comes a complex web of...

Top 10 cybersecurity misconfigurations and how to avoid them

Log360 | September 20, 2024

Top 10 cybersecurity misconfigurations and how to avoid them

Have you ever heard of the 80/20 rule? The 80/20 rule, also known as the Pareto principle...

The states of data, Part 1: Why you should protect data at rest, in use, and in motion

DataSecurity Plus | September 17, 2024

The states of data, Part 1: Why you should protect data at rest, in use, and in motion

What do Morgan Stanley, Samsung, and a New York credit union all have in common? They...

The HIPAA compliance checklist for security managers

Log360 | September 17, 2024

The HIPAA compliance checklist for security managers

The healthcare sector in the United States has seen a continuous increase in both the...

7 firewall management best practices in 2024

Firewall Analyzer | September 13, 2024

7 firewall management best practices in 2024

Firewalls act as the first line of defense, filtering network traffic and blocking...

Enhance network security: 6 key steps for an effective firewall rule audit

Firewall Analyzer | September 4, 2024

Enhance network security: 6 key steps for an effective firewall rule audit

A firewall rule audit is an essential process for ensuring that your firewall rules are...

Data classification: The fundamental requirement of successful DLP programs

DataSecurity Plus | September 3, 2024

Data classification: The fundamental requirement of successful DLP programs

The way we store data has undergone a dramatic shift. From good ol' floppy disks   to...

Page 2 of 28«1234...»Last »