IT Security | May 31, 2023Unravelling the TDIR framework: Conception, evolution, and categorization Cybersecurity is a mix of both reactive and proactive approaches. In the past,...
Log360 | May 26, 2023CISO handbook: Cybersecurity metrics, budgeting, and leadership [E-book] Chief information security officers (CISOs) are the backbone behind the security...
Log360 | May 22, 2023User identity mapping for improved anomaly detection In any organization, a user may access numerous devices and applications, but not always...
Log360 | May 19, 2023Threat hunting 101: Leveraging the MITRE ATT&CK® framework for extended threat detection Threat detection and mitigation is one of the core responsibilities of a SOC. With...
IT Security | May 19, 2023Latitude data breach: How one click could cost you everything Imagine clicking on a seemingly harmless link and unknowingly giving away your personal...
Security Information and Event Management | May 18, 2023Will predictive AI revolutionize the SIEM industry? The cybersecurity industry is extremely dynamic and always finds a way to accommodate the...
Firewall Analyzer | May 17, 2023From logs to insights: Using Firewall Analyzer to monitor Squid proxy activity Squid proxies are among the most popular open-source proxy servers preferred by companies...
Log360 | May 10, 2023Discover how attackers exploit DNS vulnerabilities in Active Directory A DNS server is an integral part of an AD environment. Simple yet crucial activities are...
Log360 | May 8, 2023[Webinar] How to build a team to run your SOC and SIEM Setting up the required defenses against cyberattacks is high on every organization's...
Log360 | April 17, 2023How to comply with ISO 27001:2022 security controls using SIEM When it comes to compliance, all enterprises struggle to keep up with the latest versions...
Log360 | April 5, 2023[Webinar] The evolution of AI and ML in cybersecurity Artificial intelligence (AI) and machine learning (ML) are critical components of any...
Security Information and Event Management | March 17, 2023Inside the mind of a hacker: Alternate identities and varied behavioral patterns The boom of information technology opened an entirely new world of identities and...