• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

The role dark web monitoring plays in regulatory compliance

Log360 | October 1, 2024

The role dark web monitoring plays in regulatory compliance

The digital age has transformed industries, but with it comes a complex web of...

Top 10 cybersecurity misconfigurations and how to avoid them

Log360 | September 20, 2024

Top 10 cybersecurity misconfigurations and how to avoid them

Have you ever heard of the 80/20 rule? The 80/20 rule, also known as the Pareto principle...

The HIPAA compliance checklist for security managers

Log360 | September 17, 2024

The HIPAA compliance checklist for security managers

The healthcare sector in the United States has seen a continuous increase in both the...

Dark web monitoring as your early warning system for insider threats

Log360 | July 29, 2024

Dark web monitoring as your early warning system for insider threats

According to the 2023 Insider Threat Report by Cybersecurity Insiders, 74% of...

Log360 | May 13, 2024

Has your personal data been breached on the dark web?

The dark web can feel like a mysterious underworld, a hidden corner of the internet where...

Data poisoning: Prevention strategies to keep your data safe

Log360 | January 30, 2024

Data poisoning: Prevention strategies to keep your data safe

The amount of data generated and fed into AI systems has increased quickly over the last...

Protecting your SDLC from a supply chain attack

Log360 | December 19, 2023

Protecting your SDLC from a supply chain attack

Did you know that nine out of 10 companies detected software supply chain risks in the...

How to improve risk scoring and threat detection with UEBA [Free e-book]

Log360 | November 16, 2023

How to improve risk scoring and threat detection with UEBA [Free e-book]

Did you know that in 2022, the mean time to detect a breach was as many as 207 days? It's...

Cybersecurity KPI metrics that CISOs should track

Log360 | September 18, 2023

Cybersecurity KPI metrics that CISOs should track

It's important for chief information security officers (CISOs) to track certain metrics...

Staying ahead of LockBit ransomware attacks

Log360 | September 14, 2023

Staying ahead of LockBit ransomware attacks

LockBit is a Ransomware as a Service (RaaS) provider accountable for most LockBit...

[Webinar] How to bolster cybersecurity by gaining complete network visibility

Log360 | August 10, 2023

[Webinar] How to bolster cybersecurity by gaining complete network visibility

To prevent cyberattacks, you need complete visibility into all the events that occur...

ManageEngine Recognized as a Customers' Choice in 2023 Gartner® Peer Insights 'Voice of the Customer': Security Information and Event Management (SIEM) for the fourth time

Log360 | August 1, 2023

ManageEngine Recognized as a Customers' Choice in 2023 Gartner® Peer Insights 'Voice of the Customer': Security Information and Event Management (SIEM) for the fourth time

We're thrilled to announce that ManageEngine has once again been recognized as a...

Page 2 of 10«1234...»Last »