Log360 | September 17, 2024The HIPAA compliance checklist for security managers The healthcare sector in the United States has seen a continuous increase in both the...
General | September 2, 2024O que são operações de segurança (SecOps)? A Tecnologia da Informação tem se tornado cada vez mais ampla, e com isso, as operações de...
General | February 19, 2024Indicadores de risco em TI: quais são e como usá-los a seu favor Na área da Tecnologia da Informação, onde as ameaças cibernéticas e os desafios...
Log360 | January 30, 2024Data poisoning: Prevention strategies to keep your data safe The amount of data generated and fed into AI systems has increased quickly over the last...
Log360 | December 19, 2023Protecting your SDLC from a supply chain attack Did you know that nine out of 10 companies detected software supply chain risks in the...
Log360 | September 14, 2023Staying ahead of LockBit ransomware attacks LockBit is a Ransomware as a Service (RaaS) provider accountable for most LockBit...
Log360 | August 1, 2023ManageEngine Recognized as a Customers' Choice in 2023 Gartner® Peer Insights 'Voice of the Customer': Security Information and Event Management (SIEM) for the fourth time We're thrilled to announce that ManageEngine has once again been recognized as a...
Log360 | March 15, 2023Segurança da nuvem: nosso prognóstico para 2023 A tecnologia de nuvem está sendo cada vez mais usada devido à sua escalabilidade e...
General | March 14, 2023¿Por qué y cómo sucede el robo de información? ¿Te has preguntado cuales son los factores débiles que puede llegar a tener tu empresa y...
Log360 | December 27, 2022Year in review: ManageEngine Log360's analyst recognition from 2022 Cyberattacks have intensified over the last few years as threat actors are always...
Log360 | December 7, 2022[Webinar] How to ace compliance in the era of stringent regulatory standards The growing prevalence of hybrid work environments has introduced a host of problems,...
Log360 | October 6, 2022[Webinar] The top-five correlation rules to master threat detection in your network Correlating events to identify if they are part of a larger incident or attack is one of...