Log360 | June 24, 2019Five reasons to choose Log360, part 1: User-friendly deployment and UI SIEM solutions are a must-have in any organization's security toolkit. They allow you to...
Log360 | December 18, 2018Conquer it with correlation—Part 3: Cryptojacking In the previous posts of this blog series, we discussed advanced persistent threats and...
Log360 | December 3, 2018Conquer it with correlation—Part 2: The data breach In my previous post, we looked at how event correlation can be used to deal with advanced...
Log360 | November 26, 2018Conquer it with correlation—Part 1: The advanced persistent threat (APT) Among all the pesky attacks that keep security administrators working late, advanced...
Log360 | August 23, 2018Unravel security incidents using event correlation [Webinar] Event correlation helps you wrap your head around the countless number of events going on...
Log360 | July 27, 2018Webinar: Streamline incident management using SIEM Organizations deal with several security incidents on a daily basis. Establishing...
Log360 | June 25, 2018Contest alert: Take part in the Log360 product pro challenge We are delighted to announce our "Log360 product pro" challenge, a unique community...
IT Security | April 26, 2018Train to be a SIEM scholar with our Log360 certification program Starting April 25th, we're hosting a free, four-part training program on security...
General | April 12, 2018Third biggest data breach in history emphasizes the need for the GDPR The top two data breaches in history, when you look at the number of affected users, comes...
Log360 | October 10, 2017Six things to consider before choosing a log management solution Budgeting for IT has always been a problematic topic of discussion when planning an...
Identity and access management | October 5, 2017<em>Where’d you get those macarons?</em> and other top questions from our AD one-on-ones Last month we said you should be able to "spend less time worrying about your IT, and...
Log360 | September 20, 2017Adopting a SIEM solution? Here's what you need to know Cyberattacks have become an everyday affair, especially with the WannaCry attack and...