• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:Log360

[E-book] How to detect and respond to cryptojacking attacks

Log360 | September 26, 2022

[E-book] How to detect and respond to cryptojacking attacks

Did you know that while the world was grappling with the effects of the pandemic,...

How to automate incident response and increase security maturity [Webinar]

Log360 | September 9, 2022

How to automate incident response and increase security maturity [Webinar]

Due to the increase in cyberattacks, security analysts are challenged with multiple...

Automated incident response using Log360

Log360 | August 4, 2022

Automated incident response using Log360

Security teams are often overwhelmed with alerts daily, including false positives, and...

How to supercharge your SIEM with the MITRE ATT&CK framework [Webinar]

Log360 | July 20, 2022

How to supercharge your SIEM with the MITRE ATT&CK framework [Webinar]

The non-profit organization, MITRE, formulated the Adversarial Tactics, Techniques and...

A security analyst's guide to understanding ransomware: The healthcare edition [E-book]

Log360 | July 19, 2022

A security analyst's guide to understanding ransomware: The healthcare edition [E-book]

If you're an IT security specialist, you're probably familiar with the overwhelming...

Establishing a least privilege environment in healthcare organizations [E-book]

Log360 | June 9, 2022

Establishing a least privilege environment in healthcare organizations [E-book]

Did you know that by selling a single health record on the dark web, an attacker can get...

The handbook that every cybersecurity analyst needs [E-book]

Log360 | April 6, 2022

The handbook that every cybersecurity analyst needs [E-book]

The IT industry recognizes the drastic increase in cyberattacks in the past few years....

4 golden reasons for equipping your SOC with ManageEngine Log360

Log360 | March 31, 2022

4 golden reasons for equipping your SOC with ManageEngine Log360

Cyberattacks are fast becoming a part of our daily lives. Multiple sources such as Norton...

Anomaly Detection In Cybersecurity For Dummies [E-book]

Log360 | March 3, 2022

Anomaly Detection In Cybersecurity For Dummies [E-book]

If you are a cybersecurity professional, you must be aware that cyberattacks, especially...

[Free online guide] Critical Windows event IDs and security use cases to monitor

Log360 | December 7, 2021

[Free online guide] Critical Windows event IDs and security use cases to monitor

According to Statcounter, 75.18% of servers across the globe use a Windows operating...

Log360 | October 29, 2021

13 spooky security threats that happened in 2021

Alan is one of the senior officers of a financial bank in Texas. Alan was looking to buy a...

Log360 | September 9, 2021

How Kaseya fell victim to a ransomware attack

On July 2, 2021, the cybersecurity world woke up to yet another ransomware attack—this...

Page 5 of 10« First«...34567...»Last »