• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

ADAudit Plus | September 29, 2022

See your estimated ROI when you automate IT audit report generation with ADAudit Plus

In an IT environment, audit reports need to be generated to meet various security and...

[E-book] How to detect and respond to cryptojacking attacks

Log360 | September 26, 2022

[E-book] How to detect and respond to cryptojacking attacks

Did you know that while the world was grappling with the effects of the pandemic,...

How to automate incident response and increase security maturity [Webinar]

Log360 | September 9, 2022

How to automate incident response and increase security maturity [Webinar]

Due to the increase in cyberattacks, security analysts are challenged with multiple...

Security use cases: The key to test the readiness of your SIEM solution

Security Information and Event Management | August 17, 2022

Security use cases: The key to test the readiness of your SIEM solution

Organizations have started considering cybersecurity as a top priority lately. The amount...

Automated incident response using Log360

Log360 | August 4, 2022

Automated incident response using Log360

Security teams are often overwhelmed with alerts daily, including false positives, and...

How to supercharge your SIEM with the MITRE ATT&CK framework [Webinar]

Log360 | July 20, 2022

How to supercharge your SIEM with the MITRE ATT&CK framework [Webinar]

The non-profit organization, MITRE, formulated the Adversarial Tactics, Techniques and...

A security analyst's guide to understanding ransomware: The healthcare edition [E-book]

Log360 | July 19, 2022

A security analyst's guide to understanding ransomware: The healthcare edition [E-book]

If you're an IT security specialist, you're probably familiar with the overwhelming...

Security Information and Event Management | July 5, 2022

Data Privacy Day, Part 2: Overcoming challenges in securing customer information

In part 1 of this series, we discussed data privacy, the related laws, and the data...

How ADAudit Plus helps you assess your exposure to Follina (CVE-2022-30190)

ADAudit Plus | June 13, 2022

How ADAudit Plus helps you assess your exposure to Follina (CVE-2022-30190)

The recently discovered Windows zero-day vulnerability continues to make news as threat...

Establishing a least privilege environment in healthcare organizations [E-book]

Log360 | June 9, 2022

Establishing a least privilege environment in healthcare organizations [E-book]

Did you know that by selling a single health record on the dark web, an attacker can get...

The handbook that every cybersecurity analyst needs [E-book]

Log360 | April 6, 2022

The handbook that every cybersecurity analyst needs [E-book]

The IT industry recognizes the drastic increase in cyberattacks in the past few years....

4 golden reasons for equipping your SOC with ManageEngine Log360

Log360 | March 31, 2022

4 golden reasons for equipping your SOC with ManageEngine Log360

Cyberattacks are fast becoming a part of our daily lives. Multiple sources such as Norton...

Page 8 of 28« First«...678910...»Last »