• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:Cybersecurity

Windows Defender Firewall misconfigurations and GPOs: Connecting the dots

Identity and access management | October 19, 2023

Windows Defender Firewall misconfigurations and GPOs: Connecting the dots

Many enterprises have a variety of aspects that make up their networks, like Windows...

Top tips: 3 ways to defend your critical IT infrastructure against ransomware

General | October 12, 2023

Top tips: 3 ways to defend your critical IT infrastructure against ransomware

Top tips is a weekly column where we highlight what’s trending in the tech world today and...

Five worthy reads: Strengthening cybersecurity—exploring vital legal provisions

General | August 11, 2023

Five worthy reads: Strengthening cybersecurity—exploring vital legal provisions

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

[Webinar] How to bolster cybersecurity by gaining complete network visibility

Log360 | August 10, 2023

[Webinar] How to bolster cybersecurity by gaining complete network visibility

To prevent cyberattacks, you need complete visibility into all the events that occur...

Five worthy reads: Cybersecurity in the age of AI — Battling sophisticated threats

General | July 28, 2023

Five worthy reads: Cybersecurity in the age of AI — Battling sophisticated threats

Five worthy reads is a regular column on five noteworthy items we have discovered while...

[Webinar] How to measure the effectiveness of your security operations center

Log360 | June 5, 2023

[Webinar] How to measure the effectiveness of your security operations center

Network visibility is the first step towards security. You need to know what activities...

User identity mapping for improved anomaly detection

Log360 | May 22, 2023

User identity mapping for improved anomaly detection

In any organization, a user may access numerous devices and applications, but not always...

General | May 10, 2023

Securing your enterprise: The importance of a security operations center

The world is increasingly embracing cloud technology. The fact that cloud requires minimal...

[Webinar] How to build a team to run your SOC and SIEM

Log360 | May 8, 2023

[Webinar] How to build a team to run your SOC and SIEM

Setting up the required defenses against cyberattacks is high on every organization's...

Breaking the password barrier: Improve password security

ADSelfService Plus | April 27, 2023

Breaking the password barrier: Improve password security

Imagine a world beyond passwords, where users can securely access data anyplace at any...

How to comply with ISO 27001:2022 security controls using SIEM

Log360 | April 17, 2023

How to comply with ISO 27001:2022 security controls using SIEM

When it comes to compliance, all enterprises struggle to keep up with the latest versions...

[Webinar] The evolution of AI and ML in cybersecurity

Log360 | April 5, 2023

[Webinar] The evolution of AI and ML in cybersecurity

Artificial intelligence (AI) and machine learning (ML) are critical components of any...

Page 3 of 1«12345...»Last »