• Topics
    • Advanced IT analytics
    • Application Performance
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:cyberattacks

Data security threats: How to safeguard your data from modern pirates [Free e-book]

DataSecurity Plus | July 26, 2024

Data security threats: How to safeguard your data from modern pirates [Free e-book]

To stay safe from modern-day pirates, you need elaborate, multi-layered security measures...

[Webinar] How to measure the effectiveness of your security operations center

Log360 | June 5, 2023

[Webinar] How to measure the effectiveness of your security operations center

Network visibility is the first step towards security. You need to know what activities...

[Webinar] How to build a team to run your SOC and SIEM

Log360 | May 8, 2023

[Webinar] How to build a team to run your SOC and SIEM

Setting up the required defenses against cyberattacks is high on every organization's...

Five worthy reads: Shielding mobile applications from cyberattackers

General | May 5, 2023

Five worthy reads: Shielding mobile applications from cyberattackers

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Five worthy reads: Understanding cyber insurance and why it is important for your business

General | December 16, 2022

Five worthy reads: Understanding cyber insurance and why it is important for your business

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Efficiently uncover network device threats and ensure a safer IT environment

Vulnerability Manager Plus | December 6, 2022

Efficiently uncover network device threats and ensure a safer IT environment

According to a study by Microsoft, more than 80% of enterprises have experienced at least...

How not to become a corporate account takeover victim 101

General | November 16, 2022

How not to become a corporate account takeover victim 101

Account takeover is an attack where cybercriminals take ownership of user accounts using...

Traversing from healthcare attacks to HIPAA compliance

Log360 | November 7, 2022

Traversing from healthcare attacks to HIPAA compliance

Healthcare organizations are unarguably popular targets for cyberattacks. With an...

AD360 | August 30, 2022

Cyber insurance: Here's why you need it

With the alarming increase in cyberattacks across the globe, it is becoming evident that...

A security analyst's guide to understanding ransomware: The healthcare edition [E-book]

Log360 | July 19, 2022

A security analyst's guide to understanding ransomware: The healthcare edition [E-book]

If you're an IT security specialist, you're probably familiar with the overwhelming...

AD360 | June 29, 2022

How to lower security risks and cyber insurance premiums

The COVID-19 pandemic has transformed the way we live and work as we continue to rely more...

Establishing a least privilege environment in healthcare organizations [E-book]

Log360 | June 9, 2022

Establishing a least privilege environment in healthcare organizations [E-book]

Did you know that by selling a single health record on the dark web, an attacker can get...

Page 1 of 1123»Last »