• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:cyberattacks

Connecting the logs with event correlation

EventLog Analyzer | April 24, 2018

Connecting the logs with event correlation

Starting with the basics Security information and event management (SIEM) helps with...

IT Security | February 13, 2018

Ransomware attackers and victims fall victim to ransom theft

Recently, there has been a string of attacks affecting some ransomware victims who pay...

What companies should know about the Kaspersky breach

Endpoint Central | October 20, 2017

What companies should know about the Kaspersky breach

While enterprises around the world are preparing themselves for external hacking attempts...

Free e-book: Six best practices for escaping ransomware

Endpoint Central | October 13, 2017

Free e-book: Six best practices for escaping ransomware

Breaking news about cyber attacks has reached an all-time high recently, with ransomware...

Secure your endpoints: Locky ransomware launches massive email campaigns

Endpoint Central | September 15, 2017

Secure your endpoints: Locky ransomware launches massive email campaigns

Just when organizations were starting to feel safe after WannaCry and Petya, security...

Using Foxit Reader? You might be vulnerable to network breaches 

Endpoint Central | August 25, 2017

Using Foxit Reader? You might be vulnerable to network breaches 

Cybersecurity and cyberattacks have become prominent topics lately. No matter how much...

Prevent CowerSnail network breaches with the right patch management solution. 

Endpoint Central | August 4, 2017

Prevent CowerSnail network breaches with the right patch management solution. 

It's hard to keep note of all the malware that's been unleashed in last three months; the...

Page 3 of 1«123