• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:log forensics

The handbook that every cybersecurity analyst needs [E-book]

Log360 | April 6, 2022

The handbook that every cybersecurity analyst needs [E-book]

The IT industry recognizes the drastic increase in cyberattacks in the past few years....

Solving a Cyber Crime Case Like Sherlock Holmes

EventLog Analyzer | December 3, 2014

Solving a Cyber Crime Case Like Sherlock Holmes

IT security managers lay a lot of emphasis on conducting log forensics investigations....

8 Log Management Habits of Highly Effective IT Security Managers

EventLog Analyzer | November 11, 2014

8 Log Management Habits of Highly Effective IT Security Managers

In today’s business environment, data is the source that drives organizations in the...

Firewall Analyzer | July 9, 2012

Guest Post: How ‘Credit Union of Denver’ secures its network and provides business continuity to their customers…cost-effectively!

By Benjamin Shumaker, Vice President of IT/ISO at Credit Union of Denver ManageEngine...