• Critical Infrastructure: Cybersecurity and the energy sector

    Digitalization has brought huge benefits to energy sector businesses. Internet of Things (IoT) devices, [...]

  • Critical Infrastructure: What is NIS2?

    The EU is often looked too as a global cybersecurity leader. And NIS2, a new [...]

  • What is a Managed Security Service Provider (MSSP)?

    A Managed Security Service Provider (MSSP) facilitates managed security services for the end user. This [...]

  • We found out what MSSPs really want. But why did we want to know?

    by Matthew Rhodes, Regional Director for MSSP & Consulting PartnersWhen I joined Logpoint back in [...]

  • Niels Onat: Experienced MSSP leader, joins Logpoint. Matt Rhodes, Regional Director for MSSP, caught up with him to ask – Why?

    From seasoned cybersecurity business leader to Regional Director of the Nordics and Baltics with Logpoint. [...]

  • Protecting Intellectual Property (IP) in SAP

    Always the bridesmaid and never the bride, SAP, in security terms, is the often-maligned function [...]

  • GDPR compliance through the protection of SAP systems

    The importance of SAP for compliance with the General Data Protection Regulation (GDPR).The implementation of [...]

  • The importance of SAP audits

    Why can a failed SAP audit put your business at risk, and how to ensure [...]

  • Logpoint BCS for SAP: Securing your SAP systems from cyber threats

    Protecting your SAP environment is critical to sustainable business success. So how can we prevent [...]

  • Emerging Threat: A Spool’s Gold: CVE-2022-21999 – Yet another Windows Print Spooler Privilege Escalation

    by Nilaa Maharjan Logpoint Global Services & Security ResearchWhat is SpoolFool (CVE-2022-21999)?SpoolFool, also known as [...]

  • Augment your Windows and EDR telemetry with Sysmon

    by Bhabesh Raj Rai, Security Research Sysmon (System Monitor) is one of the popular tools [...]

  • Emerging Threats: ChromeLoader: A rise in malvertisers

    Nilaa Maharjan, Logpoint Global Services & Security ResearchThis blog post provides an overview of the [...]