• On Demand: Ease of use with SOAR: Streamline Investigation and Response

    Discover the latest updates to SOAR, bringing ease of work to your security operations platform.In [...]

  • The Rise of Zero Trust Network Security: What You Need to Know

    Organizations face an ever-increasing number of sophisticated cyber threats. Traditional network security models, which rely [...]

  • Big Data and Cybersecurity: A Powerful Union for a Safer Digital Age

    In the interconnected world we inhabit, data drives our decisions, businesses, and even our daily [...]

  • How to Build a SOC Team: A Cyber Security Shield Against Digital Threats

    In today's interconnected world, the risk of cyber threats and attacks is ever-present. The escalating [...]

  • Threat Hunting: Collaboration. Harnessing the Power of Teamwork

    In today's ever-evolving cybersecurity landscape, organizations face a growing number of sophisticated threats. To effectively [...]

  • On Demand: Overcoming the compliance challenges with BCS for SuccessFactors

    Even though SAP SuccessFactors contains some of the organization’s most sensitive and regulated data, it [...]

  • SOX Cybersecurity Compliance – What is it?

    SOX or The Sarbanes-Oxley Act (SOX) was passed in 2002 in the USA and requires [...]

  • What is SIEM? The Ultimate Guide to Security Information and Event Management

    Data protection and cyber threat detection are crucial for businesses in today's landscape. Security Information [...]

  • PaperCut Vulnerability CVE-2023-27350: Detecting exploitation attempts

    by Anish Bogati & Rabindra Dev Bhatta, Security Research - Updated May 8th 2023PaperCut is [...]

  • Phishing: Logpoint SOAR deep dive – Achieving a 77% reduction in time to resolution

    Phishing is a cyber-attack where an adversary sends fraudulent emails, text messages, or other electronic [...]

  • On Demand: The Importance of Cybersecurity Technology in SAP Business Transformation

    The webinar is now on demand and is hosted by Logpoint and has Marc Noergaard [...]

  • Detecting and Responding to Trojanized 3CX Desktop Applications

    By Santosh Nepal and Anish Bogati; Security ResearchUpdated on 21st AprilQuick Digest:When a new application [...]