• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:Data Security

Security Information and Event Management | April 9, 2020

Hardening Windows security: How to secure your organization—Part 1

The cybersecurity threat landscape is quickly changing. Administrators have become more...

IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck]

IT Security | April 8, 2020

IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck]

The definition of an “attack” is changing. The level of complexity and technical expertise...

IT security: Keep calm and monitor PowerShell 

ADAudit Plus | February 27, 2020

IT security: Keep calm and monitor PowerShell 

In our last release of the PowerShell security series, we talked about how PowerShell...

IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance 

IT Security | February 3, 2020

IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance 

Cyberattacks are a growing threat, and organizations are investing time and money in...

IT security: PowerShell as a cyberattack tool 

IT Security | January 10, 2020

IT security: PowerShell as a cyberattack tool 

Tools and features introduced with the intention of benefiting and empowering an...

Four simple ways to secure data in misplaced or stolen devices

Mobile Device Manager Plus | September 17, 2019

Four simple ways to secure data in misplaced or stolen devices

In the modern era of mobility, corporate data is remotely accessed by employees around...

Dealing with three pathbreaking scenarios under the CCPA

Log360 | August 1, 2019

Dealing with three pathbreaking scenarios under the CCPA

The "right to be forgotten" is one of the new rights consumers will have under the CCPA. ...

Log360 | July 15, 2019

Five reasons to choose Log360, part 4: Advanced security features

Part two and part three of this blog series gave a detailed look at Log360's in-depth...

Five worthy reads: Educating the education sector on cybersecurity

General | July 5, 2019

Five worthy reads: Educating the education sector on cybersecurity

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Six reasons why data backups are crucial for your business

General | January 23, 2019

Six reasons why data backups are crucial for your business

The increase in ransomware attacks and high-profile data breaches over the last few years...

Conquer it with correlation—Part 2: The data breach

Log360 | December 3, 2018

Conquer it with correlation—Part 2: The data breach

In my previous post, we looked at how event correlation can be used to deal with advanced...

Conquer it with correlation—Part 1: The advanced persistent threat (APT)

Log360 | November 26, 2018

Conquer it with correlation—Part 1: The advanced persistent threat (APT)

Among all the pesky attacks that keep security administrators working late, advanced...

Page 3 of 4«1234»Last »