• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:Data breaches

Five worthy reads: Cybersecurity in the age of AI — Battling sophisticated threats

General | July 28, 2023

Five worthy reads: Cybersecurity in the age of AI — Battling sophisticated threats

Five worthy reads is a regular column on five noteworthy items we have discovered while...

The Monopoly Man takes on privacy, data breaches, and more [Podcast series]

Log360 | April 21, 2020

The Monopoly Man takes on privacy, data breaches, and more [Podcast series]

In the second and final episode of our Expert Tech Talk podcast series, Ian Madrigal,...

Five worthy reads: A look at the healthcare sector's persistent insider threat

General | March 8, 2019

Five worthy reads: A look at the healthcare sector's persistent insider threat

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Conquer it with correlation—Part 2: The data breach

Log360 | December 3, 2018

Conquer it with correlation—Part 2: The data breach

In my previous post, we looked at how event correlation can be used to deal with advanced...

IT Security | June 6, 2018

Adopting a SIEM solution, Part 1: Why choose SIEM?

Security threats are on the rise and hackers' attack methods are becoming more...

Lessons from data breaches that every enterprise should take to heart

General | April 11, 2018

Lessons from data breaches that every enterprise should take to heart

"Four years later, Yahoo still doesn't know how 3 billion accounts were hacked" read...

Free e-book: Six best practices for escaping ransomware

Endpoint Central | October 13, 2017

Free e-book: Six best practices for escaping ransomware

Breaking news about cyber attacks has reached an all-time high recently, with ransomware...