• Topics
    • Advanced IT analytics
    • Application Performance
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:endpoint IT security

The role of endpoints in the security of your network

Log360 | June 21, 2021

The role of endpoints in the security of your network

Endpoint security is a hot topic of discussion, especially now with so many businesses...

Protect your organization against Adrozek

Unified endpoint management and security | December 24, 2020

Protect your organization against Adrozek

Adrozek is a malicious browser modifier that, when installed on users' machines, infects...

Five worthy reads: Preparing an incident response plan for the pandemic and beyond

General | October 24, 2020

Five worthy reads: Preparing an incident response plan for the pandemic and beyond

Illustration by Ilamparithi Raju Five worthy reads is a regular column on five noteworthy...

Log360 | August 4, 2020

Can a misconfigured user account lead to a security breach?

Do you remember the last time you had to reset the password for an admin user? Or the time...

Unfolding the Twitter security incident

IT Security | July 30, 2020

Unfolding the Twitter security incident

In case 2020 wasn't dystopian enough, here's some more unbelievable news. On July 15, 2020...

Cybersecurity use cases for better remote workforce management

General | May 13, 2020

Cybersecurity use cases for better remote workforce management

Credits- Illustrator: S Amirthalingam In the new normal, if your business has chosen...

Five worthy reads: Educating the education sector on cybersecurity

General | July 5, 2019

Five worthy reads: Educating the education sector on cybersecurity

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Five worthy reads: A look at the healthcare sector's persistent insider threat

General | March 8, 2019

Five worthy reads: A look at the healthcare sector's persistent insider threat

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Five worthy reads: Unified endpoint management, a 360° look at organizational security

General | March 30, 2018

Five worthy reads: Unified endpoint management, a 360° look at organizational security

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

5 building blocks for seamless endpoint security

Endpoint Central | December 6, 2017

5 building blocks for seamless endpoint security

Enterprise security has become a top priority with the recent spike in cyber attacks....