• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:Security Information and Event Management

How your favorite apps use protocols: A look at real-world scenarios

Log360 | December 11, 2024

How your favorite apps use protocols: A look at real-world scenarios

Ever wondered how computers and servers talk to each other without descending into...

How to adapt firewall rules for medical device security in healthcare

Firewall Analyzer | December 10, 2024

How to adapt firewall rules for medical device security in healthcare

Healthcare has become more digitized; medical devices play an increasingly vital role in...

What is a Secure Socket Layer (SSL)? How does it ensure safe connection?

Log360 | December 2, 2024

What is a Secure Socket Layer (SSL)? How does it ensure safe connection?

Imagine all your online activity being put out in the open—as private as a billboard in...

The states of data, Part 3: Data in use and why you need to keep an eye on file activities

DataSecurity Plus | October 8, 2024

The states of data, Part 3: Data in use and why you need to keep an eye on file activities

In our previous blog, The states of data, Part 2: Why visibility is key for protecting...

The role dark web monitoring plays in regulatory compliance

Log360 | October 1, 2024

The role dark web monitoring plays in regulatory compliance

The digital age has transformed industries, but with it comes a complex web of...

Top 10 cybersecurity misconfigurations and how to avoid them

Log360 | September 20, 2024

Top 10 cybersecurity misconfigurations and how to avoid them

Have you ever heard of the 80/20 rule? The 80/20 rule, also known as the Pareto principle...

The states of data, Part 1: Why you should protect data at rest, in use, and in motion

DataSecurity Plus | September 17, 2024

The states of data, Part 1: Why you should protect data at rest, in use, and in motion

What do Morgan Stanley, Samsung, and a New York credit union all have in common? They...

The HIPAA compliance checklist for security managers

Log360 | September 17, 2024

The HIPAA compliance checklist for security managers

The healthcare sector in the United States has seen a continuous increase in both the...

7 firewall management best practices in 2024

Firewall Analyzer | September 13, 2024

7 firewall management best practices in 2024

Firewalls act as the first line of defense, filtering network traffic and blocking...

Enhance network security: 6 key steps for an effective firewall rule audit

Firewall Analyzer | September 4, 2024

Enhance network security: 6 key steps for an effective firewall rule audit

A firewall rule audit is an essential process for ensuring that your firewall rules are...

Data classification: The fundamental requirement of successful DLP programs

DataSecurity Plus | September 3, 2024

Data classification: The fundamental requirement of successful DLP programs

The way we store data has undergone a dramatic shift. From good ol' floppy disks   to...

Strengthening your defenses: Aligning Firewall Analyzer with the new PCI DSS v4.0 standards

Firewall Analyzer | August 19, 2024

Strengthening your defenses: Aligning Firewall Analyzer with the new PCI DSS v4.0 standards

According to IBM's 2023 Cost of a Data Breach Report, the global average cost of a data...

Page 2 of 28«1234...»Last »