• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:threat intelligence

The handbook that every cybersecurity analyst needs [E-book]

Log360 | April 6, 2022

The handbook that every cybersecurity analyst needs [E-book]

The IT industry recognizes the drastic increase in cyberattacks in the past few years....

Five worthy reads: Supply chain cyberwarfare

General | January 22, 2021

Five worthy reads: Supply chain cyberwarfare

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Build a resilient cybersecurity framework by transforming your IT team into a security team

Analytics Plus | October 9, 2020

Build a resilient cybersecurity framework by transforming your IT team into a security team

More organizations than ever before have shifted to a hybrid work culture to reduce the...

Five worthy reads: Threat intelligence—the key to proactive cybersecurity

General | August 3, 2019

Five worthy reads: Threat intelligence—the key to proactive cybersecurity

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Log360 | July 15, 2019

Five reasons to choose Log360, part 4: Advanced security features

Part two and part three of this blog series gave a detailed look at Log360's in-depth...

Five worthy reads: Fend off cyberattacks using dark web intelligence

General | June 7, 2019

Five worthy reads: Fend off cyberattacks using dark web intelligence

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Webinar: Learn a simple three-step approach to tackling threats

Log360 | September 26, 2018

Webinar: Learn a simple three-step approach to tackling threats

Technology has a lot to offer, from streamlining your business processes to protecting...

IT Security | July 20, 2018

How to leverage SIEM to meet the GDPR's requirements

Today's businesses run on data. From getting customer information for payment, processing...

Let's talk about STIX, TAXII, and threat intelligence

EventLog Analyzer | January 31, 2018

Let's talk about STIX, TAXII, and threat intelligence

In terms of collaboration, Structured Threat Information eXpression (STIX) and Trusted...

IT Security | July 4, 2017

Log management and SIEM fundamentals: Mitigating security threats 

In parts 1 and 2 of this blog series, we went over SIEM and its role in performing a...

2016: ManageEngine Soars with SIEM

IT Security | January 6, 2017

2016: ManageEngine Soars with SIEM

The scope of security information and event management (SIEM) is massive, and it's...

Combat Advanced Cyber Attacks With Shared Security Intelligence

EventLog Analyzer | August 6, 2014

Combat Advanced Cyber Attacks With Shared Security Intelligence

(Originally published in Cyber Defense Magazine, Black Hat special edition) ​In this...