General | July 28, 2023Five worthy reads: Cybersecurity in the age of AI — Battling sophisticated threats Five worthy reads is a regular column on five noteworthy items we have discovered while...
Log360 | April 21, 2020The Monopoly Man takes on privacy, data breaches, and more [Podcast series] In the second and final episode of our Expert Tech Talk podcast series, Ian Madrigal,...
General | March 8, 2019Five worthy reads: A look at the healthcare sector's persistent insider threat Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Log360 | December 3, 2018Conquer it with correlation—Part 2: The data breach In my previous post, we looked at how event correlation can be used to deal with advanced...
IT Security | June 6, 2018Adopting a SIEM solution, Part 1: Why choose SIEM? Security threats are on the rise and hackers' attack methods are becoming more...
General | April 11, 2018Lessons from data breaches that every enterprise should take to heart "Four years later, Yahoo still doesn't know how 3 billion accounts were hacked" read...
Endpoint Central | October 13, 2017Free e-book: Six best practices for escaping ransomware Breaking news about cyber attacks has reached an all-time high recently, with ransomware...