General | October 12, 2023Top tips: 3 ways to defend your critical IT infrastructure against ransomware Top tips is a weekly column where we highlight what’s trending in the tech world today and...
General | August 11, 2023Five worthy reads: Strengthening cybersecurity—exploring vital legal provisions Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Log360 | August 10, 2023[Webinar] How to bolster cybersecurity by gaining complete network visibility To prevent cyberattacks, you need complete visibility into all the events that occur...
General | July 28, 2023Five worthy reads: Cybersecurity in the age of AI — Battling sophisticated threats Five worthy reads is a regular column on five noteworthy items we have discovered while...
Log360 | June 5, 2023[Webinar] How to measure the effectiveness of your security operations center Network visibility is the first step towards security. You need to know what activities...
Log360 | May 22, 2023User identity mapping for improved anomaly detection In any organization, a user may access numerous devices and applications, but not always...
General | May 10, 2023Securing your enterprise: The importance of a security operations center The world is increasingly embracing cloud technology. The fact that cloud requires minimal...
Log360 | May 8, 2023[Webinar] How to build a team to run your SOC and SIEM Setting up the required defenses against cyberattacks is high on every organization's...
ADSelfService Plus | April 27, 2023Breaking the password barrier: Improve password security Imagine a world beyond passwords, where users can securely access data anyplace at any...
Log360 | April 17, 2023How to comply with ISO 27001:2022 security controls using SIEM When it comes to compliance, all enterprises struggle to keep up with the latest versions...
Log360 | April 5, 2023[Webinar] The evolution of AI and ML in cybersecurity Artificial intelligence (AI) and machine learning (ML) are critical components of any...
Log360 | March 6, 2023Top 5 webinars of 2022 When it comes to cybersecurity, being in step with the current landscape and newest...