Log360 | April 6, 2022The handbook that every cybersecurity analyst needs [E-book] The IT industry recognizes the drastic increase in cyberattacks in the past few years....
General | January 22, 2021Five worthy reads: Supply chain cyberwarfare Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Analytics Plus | October 9, 2020Build a resilient cybersecurity framework by transforming your IT team into a security team More organizations than ever before have shifted to a hybrid work culture to reduce the...
General | August 3, 2019Five worthy reads: Threat intelligence—the key to proactive cybersecurity Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Log360 | July 15, 2019Five reasons to choose Log360, part 4: Advanced security features Part two and part three of this blog series gave a detailed look at Log360's in-depth...
General | June 7, 2019Five worthy reads: Fend off cyberattacks using dark web intelligence Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Log360 | September 26, 2018Webinar: Learn a simple three-step approach to tackling threats Technology has a lot to offer, from streamlining your business processes to protecting...
IT Security | July 20, 2018How to leverage SIEM to meet the GDPR's requirements Today's businesses run on data. From getting customer information for payment, processing...
EventLog Analyzer | January 31, 2018Let's talk about STIX, TAXII, and threat intelligence In terms of collaboration, Structured Threat Information eXpression (STIX) and Trusted...
IT Security | July 4, 2017Log management and SIEM fundamentals: Mitigating security threats In parts 1 and 2 of this blog series, we went over SIEM and its role in performing a...
IT Security | January 6, 20172016: ManageEngine Soars with SIEM The scope of security information and event management (SIEM) is massive, and it's...
EventLog Analyzer | August 6, 2014Combat Advanced Cyber Attacks With Shared Security Intelligence (Originally published in Cyber Defense Magazine, Black Hat special edition) In this...