Log360 | July 19, 2022A security analyst's guide to understanding ransomware: The healthcare edition [E-book] If you're an IT security specialist, you're probably familiar with the overwhelming...
Log360 | June 9, 2022Establishing a least privilege environment in healthcare organizations [E-book] Did you know that by selling a single health record on the dark web, an attacker can get...
Log360 | April 6, 2022The handbook that every cybersecurity analyst needs [E-book] The IT industry recognizes the drastic increase in cyberattacks in the past few years....
Log360 | March 31, 20224 golden reasons for equipping your SOC with ManageEngine Log360 Cyberattacks are fast becoming a part of our daily lives. Multiple sources such as Norton...
Log360 | March 3, 2022Anomaly Detection In Cybersecurity For Dummies [E-book] If you are a cybersecurity professional, you must be aware that cyberattacks, especially...
Log360 | December 7, 2021[Free online guide] Critical Windows event IDs and security use cases to monitor According to Statcounter, 75.18% of servers across the globe use a Windows operating...
Log360 | October 29, 202113 spooky security threats that happened in 2021 Alan is one of the senior officers of a financial bank in Texas. Alan was looking to buy a...
Log360 | September 9, 2021How Kaseya fell victim to a ransomware attack On July 2, 2021, the cybersecurity world woke up to yet another ransomware attack—this...
Log360 | June 21, 2021The role of endpoints in the security of your network Endpoint security is a hot topic of discussion, especially now with so many businesses...
Log360 | May 24, 2021Building a complete network security checklist Understanding what to audit in a network can be chaotic and confusing. Building a complete...
Log360 | March 30, 2021Azure security 101: Security essentials, logs, authentication, and more “Where necessity speaks, it demands”. This old saying seems particularly apt right now...
Log360 | March 10, 2021Ransomware in 2021: What has changed? Detection and mitigation strategy A ransomware attack is a bug that we can't shake off. Or perhaps, it can even be called a...