• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

Rule impact analysis: A new dawn of firewall policy planning

Firewall Analyzer | April 15, 2019

Rule impact analysis: A new dawn of firewall policy planning

A network security device is only as strong as its rules and policies. Firewalls can have...

Quick tips to ensure your Azure AD is safe from threats

ADAudit Plus | February 25, 2019

Quick tips to ensure your Azure AD is safe from threats

Being the gatekeeper of Microsoft's cloud solutions, Azure AD comes with a wide range of...

Tracking insider threats with AI

ADAudit Plus | February 11, 2019

Tracking insider threats with AI

If you thought masked hackers in dark rooms spreading malware were your only security...

Conquer it with correlation—Part 3: Cryptojacking

Log360 | December 18, 2018

Conquer it with correlation—Part 3: Cryptojacking

In the previous posts of this blog series, we discussed advanced persistent threats and...

Conquer it with correlation—Part 2: The data breach

Log360 | December 3, 2018

Conquer it with correlation—Part 2: The data breach

In my previous post, we looked at how event correlation can be used to deal with advanced...

Conquer it with correlation—Part 1: The advanced persistent threat (APT)

Log360 | November 26, 2018

Conquer it with correlation—Part 1: The advanced persistent threat (APT)

Among all the pesky attacks that keep security administrators working late, advanced...

Firewall Analyzer enhancements that fire up your firewall devices

Firewall Analyzer | November 22, 2018

Firewall Analyzer enhancements that fire up your firewall devices

The Firewall Analyzer team is constantly working on enhancements to improve its product...

Account lockout and management tools

ADAudit Plus | November 16, 2018

Account lockout and management tools

Sometimes, when you get a call regarding a password reset, you can already guess who it...

Webinar: Learn a simple three-step approach to tackling threats

Log360 | September 26, 2018

Webinar: Learn a simple three-step approach to tackling threats

Technology has a lot to offer, from streamlining your business processes to protecting...

Unravel security incidents using event correlation [Webinar]

Log360 | August 23, 2018

Unravel security incidents using event correlation [Webinar]

Event correlation helps you wrap your head around the countless number of events going on...

Log360 | July 27, 2018

Webinar: Streamline incident management using SIEM

Organizations deal with several security incidents on a daily basis. Establishing...

Cyberattacks are coming—is your firewall ready?

Firewall Analyzer | July 12, 2018

Cyberattacks are coming—is your firewall ready?

In HBO's hit series Game of Thrones, the Seven Kingdoms had the Wall to keep out White...

Page 16 of 28« First«...1415161718...»Last »