Log360 | August 28, 2020Data security under the CCPA: A master class for IT administrators July 1, 2020 was a monumental day when it came to privacy laws in the United States. It...
Log360 | August 12, 20205 tips to avoid cyberattacks on EdTech platforms As the COVID-19 pandemic rages on, many educational institutions have been forced to shift...
Log360 | August 4, 2020Can a misconfigured user account lead to a security breach? Do you remember the last time you had to reset the password for an admin user? Or the time...
Log360 | July 23, 2020The 5 essential components of successful file server auditing File server auditing is an essential process, and inattention can cost your organization...
Log360 | July 20, 2020Business Intelligence Group's 2020 Fortress Cyber Security Award for Threat Detection goes to... We are excited to share that ManageEngine's Log360 has been awarded the 2020 Fortress...
Log360 | April 21, 2020The Monopoly Man takes on privacy, data breaches, and more [Podcast series] In the second and final episode of our Expert Tech Talk podcast series, Ian Madrigal,...
Log360 | April 14, 2020The Monopoly Man features in our first-ever Expert Tech Talk podcast series. Listen now! We are pleased to launch our first-ever Expert Tech Talk podcast series featuring...
Log360 | April 9, 2020SQL Server, Part 1: Why you should monitor SQL logs Over 44 records are stolen per second every day due to data breaches, and according to the...
Log360 | March 23, 2020Why log archival is important for network security Network devices like workstations, servers, routers, and firewalls generate a large volume...
Log360 | March 4, 2020Securing IT in healthcare organizations: All you need to know From maintaining electronic health records and generating medical reports, to carrying out...
Log360 | December 17, 2019Our Weekly IT Security Podcast series is 10 episodes strong! Have you tuned in yet? We would like to thank you for your overwhelming support for our Weekly IT Security...
Log360 | October 18, 2019Combating threats with UEBA: Money matters In this four-part series, we explore hypothetical cyberattacks inspired by real-life...