• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:event log auditing

IT security under attack: A typical day in the life of an IT admin or security analyst

Log360 | December 8, 2020

IT security under attack: A typical day in the life of an IT admin or security analyst

The job of IT admins and IT security analysts are, without a doubt, some of the most...

Email, security, and breaches

IT Security | May 14, 2020

Email, security, and breaches

Email-based attacks can take many forms, and are typically deployed by cybercriminals in...

IT Security | April 16, 2020

Hardening Windows security: How to secure your organization—Part 2

We're back with part two of our three-part blog series on living-off-the-land attacks. If...

Security Information and Event Management | April 9, 2020

Hardening Windows security: How to secure your organization—Part 1

The cybersecurity threat landscape is quickly changing. Administrators have become more...

IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck]

IT Security | April 8, 2020

IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck]

The definition of an “attack” is changing. The level of complexity and technical expertise...