• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

Anomaly Detection In Cybersecurity For Dummies [E-book]

Log360 | March 3, 2022

Anomaly Detection In Cybersecurity For Dummies [E-book]

If you are a cybersecurity professional, you must be aware that cyberattacks, especially...

Is your sensitive data overexposed?

DataSecurity Plus | February 24, 2022

Is your sensitive data overexposed?

76% of IT security leaders experienced data breaches involving the loss or theft of...

Security Information and Event Management | January 27, 2022

Data Privacy Day, Part 1: What you need to know about data privacy

Data Privacy Day (known in Europe as Data Protection Day) is an international event aimed...

Security Information and Event Management | January 21, 2022

Saudi Aramco data breach: A reminder to start monitoring RPIs

On June 23, 2021, threat actors reported that they had stolen a terabyte of data from...

[Free online guide] Critical Windows event IDs and security use cases to monitor

Log360 | December 7, 2021

[Free online guide] Critical Windows event IDs and security use cases to monitor

According to Statcounter, 75.18% of servers across the globe use a Windows operating...

ADAudit Plus | November 26, 2021

ADAudit Plus' year in review

2021 has been a feature-packed year for ADAudit Plus. Having rolled out an array of new...

Bring down data storage costs by getting rid of obsolete data [Savings estimator]

DataSecurity Plus | November 11, 2021

Bring down data storage costs by getting rid of obsolete data [Savings estimator]

Redundant, obsolete, and trivial (ROT) data refers to information housed in data...

ADAudit Plus | November 3, 2021

What causes repeated account lockouts and how to resolve them

A stringent account lockout policy is vital to derail password guessing and brute-force...

Log360 | October 29, 2021

13 spooky security threats that happened in 2021

Alan is one of the senior officers of a financial bank in Texas. Alan was looking to buy a...

Security Information and Event Management | October 14, 2021

Watch out for tenants living off your land

The cyberworld has witnessed and defended against several forms of attacks. Some of the...

Log360 | September 9, 2021

How Kaseya fell victim to a ransomware attack

On July 2, 2021, the cybersecurity world woke up to yet another ransomware attack—this...

Why companies need URL filtering for enhanced cloud protection

DataSecurity Plus | June 28, 2021

Why companies need URL filtering for enhanced cloud protection

The cloud landscape is rife with unsafe URLs and inappropriate content. This—coupled with...

Page 9 of 28« First«...7891011...»Last »