• The Hidden issue with personalizing the customer experience

    Across the industry there is much talk of personalization, making a customer’s experience as tailored [...]

  • Prowli malware detection

    Operation Prowli, a traffic manipulation and crypto currency mining malware has infected many organizations globally. [...]

  • Why anti-virus alone can’t stop cryptocurrency mining

    Guy Grieve - Channel SE Manager UK&I at LogPoint. Cryptocurrencies like Bitcoin have been a [...]

  • Hidden Cobra

    Hidden Cobra is an APT hacking group mostly targeting against media organizations, aerospace, financial and [...]

  • Introducing LogPoint 6.2.0

    We are excited to announce the launch of LogPoint version 6.2.0, characterized by new, [...]

  • LogPoint at the RSA Conference

    How is your organization preparing to deal with the new and sophisticated cyber threats?Here [...]

  • GDPR Reports

    Source: Data Protection Risk and Regulation in the Global Economy, Ponemon Institute LLC, June 2016Several [...]

  • Why do you need UEBA?

    User and Entity Behavioral Analytics (UEBA) solutions have been around for some time, and you [...]

  • Bad Rabbit ransomware

    Ransomware is without doubt one of the most rising threats nowadays, and the latest [...]

  • KRACKs

    Today we have released our application to detect the KRACK attacks. For detailed information about [...]

  • Safeguarding – Your moral duty of care?

    Andy Deacon, Pre Sales Manager UK & I, LogPoint There are lots of different reasons [...]

  • The re-emergence of Dragonfly

    An increase of dangerous Advanced Persistent Threats (APT) attacks was reported by Symantec last week. [...]