• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:Security Information and Event Management

[Webinar] How to measure the effectiveness of your security operations center

Log360 | June 5, 2023

[Webinar] How to measure the effectiveness of your security operations center

Network visibility is the first step towards security. You need to know what activities...

CISO handbook: Cybersecurity metrics, budgeting, and leadership [E-book]

Log360 | May 26, 2023

CISO handbook: Cybersecurity metrics, budgeting, and leadership [E-book]

Chief information security officers (CISOs) are the backbone behind the security...

User identity mapping for improved anomaly detection

Log360 | May 22, 2023

User identity mapping for improved anomaly detection

In any organization, a user may access numerous devices and applications, but not always...

Log360 | May 19, 2023

Threat hunting 101: Leveraging the MITRE ATT&CK® framework for extended threat detection

Threat detection and mitigation is one of the core responsibilities of a SOC. With...

Will predictive AI revolutionize the SIEM industry?

Security Information and Event Management | May 18, 2023

Will predictive AI revolutionize the SIEM industry?

The cybersecurity industry is extremely dynamic and always finds a way to accommodate the...

From logs to insights: Using Firewall Analyzer to monitor Squid proxy activity

Firewall Analyzer | May 17, 2023

From logs to insights: Using Firewall Analyzer to monitor Squid proxy activity

Squid proxies are among the most popular open-source proxy servers preferred by companies...

Log360 | May 10, 2023

Discover how attackers exploit DNS vulnerabilities in Active Directory

A DNS server is an integral part of an AD environment. Simple yet crucial activities are...

[Webinar] How to build a team to run your SOC and SIEM

Log360 | May 8, 2023

[Webinar] How to build a team to run your SOC and SIEM

Setting up the required defenses against cyberattacks is high on every organization's...

How to comply with ISO 27001:2022 security controls using SIEM

Log360 | April 17, 2023

How to comply with ISO 27001:2022 security controls using SIEM

When it comes to compliance, all enterprises struggle to keep up with the latest versions...

[Webinar] The evolution of AI and ML in cybersecurity

Log360 | April 5, 2023

[Webinar] The evolution of AI and ML in cybersecurity

Artificial intelligence (AI) and machine learning (ML) are critical components of any...

Inside the mind of a hacker: Alternate identities and varied behavioral patterns

Security Information and Event Management | March 17, 2023

Inside the mind of a hacker: Alternate identities and varied behavioral patterns

The boom of information technology opened an entirely new world of identities and...

Segurança da nuvem: nosso prognóstico para 2023

Log360 | March 15, 2023

Segurança da nuvem: nosso prognóstico para 2023

A tecnologia de nuvem está sendo cada vez mais usada devido à sua escalabilidade e...

Page 5 of 28« First«...34567...»Last »