• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:Security Information and Event Management

How to automate incident response and increase security maturity [Webinar]

Log360 | September 9, 2022

How to automate incident response and increase security maturity [Webinar]

Due to the increase in cyberattacks, security analysts are challenged with multiple...

Security use cases: The key to test the readiness of your SIEM solution

Security Information and Event Management | August 17, 2022

Security use cases: The key to test the readiness of your SIEM solution

Organizations have started considering cybersecurity as a top priority lately. The amount...

Automated incident response using Log360

Log360 | August 4, 2022

Automated incident response using Log360

Security teams are often overwhelmed with alerts daily, including false positives, and...

How to supercharge your SIEM with the MITRE ATT&CK framework [Webinar]

Log360 | July 20, 2022

How to supercharge your SIEM with the MITRE ATT&CK framework [Webinar]

The non-profit organization, MITRE, formulated the Adversarial Tactics, Techniques and...

A security analyst's guide to understanding ransomware: The healthcare edition [E-book]

Log360 | July 19, 2022

A security analyst's guide to understanding ransomware: The healthcare edition [E-book]

If you're an IT security specialist, you're probably familiar with the overwhelming...

Security Information and Event Management | July 5, 2022

Data Privacy Day, Part 2: Overcoming challenges in securing customer information

In part 1 of this series, we discussed data privacy, the related laws, and the data...

How ADAudit Plus helps you assess your exposure to Follina (CVE-2022-30190)

ADAudit Plus | June 13, 2022

How ADAudit Plus helps you assess your exposure to Follina (CVE-2022-30190)

The recently discovered Windows zero-day vulnerability continues to make news as threat...

Establishing a least privilege environment in healthcare organizations [E-book]

Log360 | June 9, 2022

Establishing a least privilege environment in healthcare organizations [E-book]

Did you know that by selling a single health record on the dark web, an attacker can get...

The handbook that every cybersecurity analyst needs [E-book]

Log360 | April 6, 2022

The handbook that every cybersecurity analyst needs [E-book]

The IT industry recognizes the drastic increase in cyberattacks in the past few years....

4 golden reasons for equipping your SOC with ManageEngine Log360

Log360 | March 31, 2022

4 golden reasons for equipping your SOC with ManageEngine Log360

Cyberattacks are fast becoming a part of our daily lives. Multiple sources such as Norton...

Anomaly Detection In Cybersecurity For Dummies [E-book]

Log360 | March 3, 2022

Anomaly Detection In Cybersecurity For Dummies [E-book]

If you are a cybersecurity professional, you must be aware that cyberattacks, especially...

Is your sensitive data overexposed?

DataSecurity Plus | February 24, 2022

Is your sensitive data overexposed?

76% of IT security leaders experienced data breaches involving the loss or theft of...

Page 8 of 28« First«...678910...»Last »