Log360 | September 9, 2022How to automate incident response and increase security maturity [Webinar] Due to the increase in cyberattacks, security analysts are challenged with multiple...
IT Security | August 19, 20223 examples of organizations that could have benefited from a CASB In recent times, the widespread use of cloud services has become common for most...
Security Information and Event Management | August 17, 2022Security use cases: The key to test the readiness of your SIEM solution Organizations have started considering cybersecurity as a top priority lately. The amount...
Log360 | August 4, 2022Automated incident response using Log360 Security teams are often overwhelmed with alerts daily, including false positives, and...
IT Security | July 22, 2022Cybersecurity compliance: Time to clean up the cobwebs Cybersecurity compliance became prominent in the last decade. From being a trivial part...
Log360 | July 20, 2022How to supercharge your SIEM with the MITRE ATT&CK framework [Webinar] The non-profit organization, MITRE, formulated the Adversarial Tactics, Techniques and...
Log360 | July 19, 2022A security analyst's guide to understanding ransomware: The healthcare edition [E-book] If you're an IT security specialist, you're probably familiar with the overwhelming...
Security Information and Event Management | July 5, 2022Data Privacy Day, Part 2: Overcoming challenges in securing customer information In part 1 of this series, we discussed data privacy, the related laws, and the data...
IT Security | July 4, 2022Clearing the air over the new CERT-In rules Authorities that lay down compliance regulations often update them in order to keep them...
ADAudit Plus | June 13, 2022How ADAudit Plus helps you assess your exposure to Follina (CVE-2022-30190) The recently discovered Windows zero-day vulnerability continues to make news as threat...
Log360 | June 9, 2022Establishing a least privilege environment in healthcare organizations [E-book] Did you know that by selling a single health record on the dark web, an attacker can get...
IT Security | May 27, 2022Cyber risk score: Learn how to quantify your organization's cyber resilience Imagine you're applying for a loan. One of the important criteria required to obtain...