IT Security | April 18, 2018Reporting on and auditing your Office 365 environment Migrating to Office 365 can seem like an immense task, but making the switch itself is...
IT Security | February 16, 2018How to prioritize your top security alerts for better SIEM Receiving alerts when a critical event occurs is the first step in responding to a...
Identity and access management | January 4, 2018A New Year's resolution for Windows administrators Did you make your personal New Year's resolution? How about your professional one? With...
Identity and access management | December 30, 20172017 IT recap—Things we learned 2017 was full of new information, new technologies, and lessons learned. As I toured the...
IT Security | December 4, 2017How SIEM can help with auditing and compliance Recent cyber breaches and tighter compliance regulations are pushing businesses to invest...
Identity and access management | October 26, 2017Tackling the top four Active Directory challenges faced by IT help desks During the course of their daily activities, IT help desks face several challenges. Among...
Log360 | September 20, 2017Adopting a SIEM solution? Here's what you need to know Cyberattacks have become an everyday affair, especially with the WannaCry attack and...
Log360 | July 18, 2017The case for incident management in a SIEM system Log360's latest incident management system is the perfect bridge between your incident...
IT Security | July 12, 2017Log management and SIEM fundamentals: Searching through logs and responding to incidents Understanding what happened in a security incident and trying to analyze the root cause of...
IT Security | July 4, 2017Log management and SIEM fundamentals: Mitigating security threats In parts 1 and 2 of this blog series, we went over SIEM and its role in performing a...
IT Security | June 28, 2017Log management and SIEM fundamentals: Comprehensive log collection and auditing The first step in SIEM is collecting log data. Log data, as we saw in part 1, is what...
IT Security | June 22, 2017Log management and SIEM fundamentals: Getting started Cyber attacks and network breaches can bring even the largest organizations to their knees...