• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:compliance

Why educational institutions need robust cybersecurity solutions

ADManager Plus | September 24, 2024

Why educational institutions need robust cybersecurity solutions

Technology has been an integral part of the education industry, even before the onset of...

Strengthening your defenses: Aligning Firewall Analyzer with the new PCI DSS v4.0 standards

Firewall Analyzer | August 19, 2024

Strengthening your defenses: Aligning Firewall Analyzer with the new PCI DSS v4.0 standards

According to IBM's 2023 Cost of a Data Breach Report, the global average cost of a data...

Firewall Analyzer | August 14, 2024

Leverage GSMA compliance to drive secure firewall configurations with Firewall Analyzer

The GSM Association, which stands for the Global System for Mobile Communications...

General | December 23, 2023

Entenda o que é o compliance em TI e como colocá-lo em prática

Para se manter no mercado competitivo atual, um ponto importante com que as empresas se...

How to comply with ISO 27001:2022 security controls using SIEM

Log360 | April 17, 2023

How to comply with ISO 27001:2022 security controls using SIEM

When it comes to compliance, all enterprises struggle to keep up with the latest versions...

[Webinar] How to ace compliance in the era of stringent regulatory standards

Log360 | December 7, 2022

[Webinar] How to ace compliance in the era of stringent regulatory standards

The growing prevalence of hybrid work environments has introduced a host of problems,...

Traversing from healthcare attacks to HIPAA compliance

Log360 | November 7, 2022

Traversing from healthcare attacks to HIPAA compliance

Healthcare organizations are unarguably popular targets for cyberattacks. With an...

The handbook that every cybersecurity analyst needs [E-book]

Log360 | April 6, 2022

The handbook that every cybersecurity analyst needs [E-book]

The IT industry recognizes the drastic increase in cyberattacks in the past few years....

Security Information and Event Management | January 27, 2022

Data Privacy Day, Part 1: What you need to know about data privacy

Data Privacy Day (known in Europe as Data Protection Day) is an international event aimed...

IT Security | October 5, 2021

13 reasons Log360 is the SIEM solution for you: Part 2

Read the first part here.  #8: You get a state-of-the-art compliance management tool Our...

[Free e-book] The Office of Inspector General's (OIG's) Microsoft 365 audit checklist

M365 Manager Plus | September 23, 2021

[Free e-book] The Office of Inspector General's (OIG's) Microsoft 365 audit checklist

What is the OIG? OIG stands for Office of Inspector General, which is part of the U.S....

Five worthy reads: Distributed cloud is the future of cloud computing

General | May 28, 2021

Five worthy reads: Distributed cloud is the future of cloud computing

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Page 1 of 3123...»Last »