• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog / Security Information and Event Management

Dealing with data glut: Why ROT data is an issue, and how to manage it

DataSecurity Plus | October 16, 2020

Dealing with data glut: Why ROT data is an issue, and how to manage it

"Unstructured data accounts for as much as 80 percent of an organization's data...

Domain controller patch alert! Vulnerability grants domain admin access in 10 seconds

Log360 | October 15, 2020

Domain controller patch alert! Vulnerability grants domain admin access in 10 seconds

A critical Active Directory vulnerability (CVE-2020-1472)   has been making headlines for...

Understanding how attackers move inside your organization

Log360 | September 30, 2020

Understanding how attackers move inside your organization

Cyberthreats have been coming at us from the left, right, and center. The number of...

Security Information and Event Management | September 23, 2020

Are you listening to your logs? Part 4: Open ports

Did you know that an organization with more open ports is more vulnerable to data breaches...

Log360 | September 17, 2020

Why following NIST guidelines will strengthen your SIEM framework

The National Institute of Standards and Technology (NIST) is a federal, non-regulatory...

Firewall Analyzer | September 16, 2020

Explore how the Firewall Analyzer add-on for OpManager can help you improve your network security!

Businesses worldwide need a stable network to ensure smooth operations. Guaranteeing...

Security Information and Event Management | September 15, 2020

Are you listening to your logs? Part 3: High disk usage

In the previous blog of this series, we saw how server crashes can be avoided by detecting...

Log360 | August 28, 2020

Data security under the CCPA: A master class for IT administrators

July 1, 2020 was a monumental day when it came to privacy laws in the United States. It...

Security Information and Event Management | August 26, 2020

Are you listening to your logs? Part 2: Low disk space

In the first part of this blog series, we saw how monitoring slow server response times in...

Log360 | August 12, 2020

5 tips to avoid cyberattacks on EdTech platforms

As the COVID-19 pandemic rages on, many educational institutions have been forced to shift...

Security Information and Event Management | August 6, 2020

Are you listening to your logs? Part 1: Slow server response

Loading… Is there a more uninspiring word to encounter while browsing the internet? When a...

Log360 | August 4, 2020

Can a misconfigured user account lead to a security breach?

Do you remember the last time you had to reset the password for an admin user? Or the time...

Page 12 of 25« First«...1011121314...»Last »