IT Security | August 15, 2018Simplifying security auditing, Part 1: Regularly reviewing server activity Everyone knows about the importance of log management in IT security. Yet, organizations...
Log360 | July 27, 2018Webinar: Streamline incident management using SIEM Organizations deal with several security incidents on a daily basis. Establishing...
IT Security | July 23, 2018Network breach at Australian National University serves as a reminder about the Notifiable Data Breaches scheme Earlier this month, several news outlets reported that Australian National University's ...
IT Security | July 20, 2018How to leverage SIEM to meet the GDPR's requirements Today's businesses run on data. From getting customer information for payment, processing...
Firewall Analyzer | July 12, 2018Cyberattacks are coming—is your firewall ready? In HBO's hit series Game of Thrones, the Seven Kingdoms had the Wall to keep out White...
Security Information and Event Management | July 6, 2018Learn how to audit and secure your SQL and IIS servers Virtually every business today depends on databases and web servers for daily operations....
EventLog Analyzer | July 3, 2018Adopting a SIEM solution, Part 2: What should you consider when choosing a SIEM tool? In part one of this two-part series, we discussed why organizations should adopt a SIEM...
Log360 | June 25, 2018Contest alert: Take part in the Log360 product pro challenge We are delighted to announce our "Log360 product pro" challenge, a unique community...
DataSecurity Plus | June 22, 2018Free webinar: Learn how to protect your enterprise from ransomware What's the first thing that comes to mind when you think about ransomware defense?...
IT Security | June 6, 2018Adopting a SIEM solution, Part 1: Why choose SIEM? Security threats are on the rise and hackers' attack methods are becoming more...
Firewall Analyzer | May 28, 2018Is global expansion crippling your hold on network security? Globalization and foreign investments have completely changed the way enterprises are run...
IT Security | May 17, 2018Free webinar on setting up critical security alerts in your environment Every security team relies on security alerts as indicators of compromise (IOCs)....