• What is Data Exfiltration?

    Originally By Ivan Vinogradov, Security Analyst, Logpoint - updated Oct 2023Data exfiltration is the practice [...]

  • Active exploitation of the Oracle WebLogic Server RCE vulnerability (CVE-2020-14882)

    By Bhabesh Raj Rai, Associate Security Analytics Engineer The October release of Oracle's quarterly Critical [...]

  • See how LogPoint 6.9 speeds up detection and investigation

    By Martha Chrisander, Head of Product Marketing, LogPoint The latest LogPoint release is all about [...]

  • What is Security Analytics? Learn about the benefits of using Security Analytics tools

    Cyber security and choosing the right Security Analytics is one of the, if not the [...]

  • What is multitenancy? The benefits of a multitenant architecture for MSSPs

    Managed security service providers (MSSPs) handle multiple customers within their technology stack. Therefore they need [...]

  • Efficient control of access to patient data with Applied Analytics

    Updated July 2023Finding the right balance between digitalization and data accessibility is not an easy [...]

  • Meet LogPoint at Les Assises 2020: Modern SIEM in the Security Operations Center

    Modern SIEM is a cornerstone technology in modern Cybersecurity and the Security Operations Center (SOC). [...]

  • The complete guide to log analysis

    Modern businesses have become reliant on data analytics, especially within cybersecurity, IT operations and compliance. [...]

  • Logpoint Guide: What is log management, and why is it so important?

    By Nils Krumrey, Global Customer Success Manager, Logpoint When customers speak to us, the number [...]

  • Microsoft Exchange Server RCE vulnerability (CVE-2020-0688)

    By Bhabesh Raj Rai, Associate Security Analytics Engineer, LogPoint On February 11, 2020, Microsoft released [...]

  • What is an Insider Threat? How to define, detect and stop an insider threat

    By Ivan Vinogradov, Solution Architect, LogPoint Risky insiders (also known as insider threats) are one [...]

  • Threat hunting with Linux – Detecting a cryptomining attack

    By Bhabesh Raj Rai, Associate Security Analytics Engineer, LogPoint Cryptomining malware was extremely popular in [...]