• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:SIEM

IT Security | September 25, 2018

Simplifying security auditing, part 5: Detecting network attacks

Anyone trying to access resources in your network needs to interact with your network...

IT Security | August 15, 2018

Simplifying security auditing, Part 1: Regularly reviewing server activity 

Everyone knows about the importance of log management in IT security. Yet, organizations...

General | August 9, 2018

Lessons from one of the first major data breaches in a post-GDPR Europe

As the buzz around the GDPR and its implementation begins to settle down, we're starting...

Log360 | July 27, 2018

Webinar: Streamline incident management using SIEM

Organizations deal with several security incidents on a daily basis. Establishing...

IT Security | July 23, 2018

Network breach at Australian National University serves as a reminder about the Notifiable Data Breaches scheme 

Earlier this month, several news outlets reported that Australian National University's ...

IT Security | July 20, 2018

How to leverage SIEM to meet the GDPR's requirements

Today's businesses run on data. From getting customer information for payment, processing...

Adopting a SIEM solution, Part 2: What should you consider when choosing a SIEM tool?

EventLog Analyzer | July 3, 2018

Adopting a SIEM solution, Part 2: What should you consider when choosing a SIEM tool?

In part one of this two-part series, we discussed why organizations should adopt a SIEM...

Log360 | June 25, 2018

Contest alert: Take part in the Log360 product pro challenge

We are delighted to announce our "Log360 product pro" challenge, a unique community...

IT Security | June 6, 2018

Adopting a SIEM solution, Part 1: Why choose SIEM?

Security threats are on the rise and hackers' attack methods are becoming more...

IT Security | May 17, 2018

Free webinar on setting up critical security alerts in your environment 

Every security team relies on security alerts as indicators of compromise (IOCs)....

Train to be a SIEM scholar with our Log360 certification program

IT Security | April 26, 2018

Train to be a SIEM scholar with our Log360 certification program

Starting April 25th, we're hosting a free, four-part training program on security...

Connecting the logs with event correlation

EventLog Analyzer | April 24, 2018

Connecting the logs with event correlation

Starting with the basics Security information and event management (SIEM) helps with...

Page 7 of 10« First«...56789...»Last »