• Detecting Privilege Escalation Zero Day (CVE-2021-41379)

    by Bhabesh Raj Rai, Associate Security Analytics Engineer On November 22, 2021, Security researcher Abdelhamid [...]

  • Implementing a Syslog Proxy compliant with LogPoint

    PurposeThough syslog protocol is very common, some customers are experiencing challenges to set it up [...]

  • Add Netflow log ingestion to LogPoint

    Netflow support is available in LogPoint and requires the Netflow Application to be installed. Once [...]

  • Implementing SOAR Solutions: How Do You Select the Best SOAR Tools?

    The world of security is changing and evolving, and traditional perimeter security is no longer [...]

  • Using SOAR to improve your cybersecurity posture

    Effective cybersecurity is an important goal for every business. More so, as many companies have [...]

  • A shift from detection to holistic response

    By Christian Have, LogPoint CTOThe capabilities of SOAR are driving the shift from security analytics [...]

  • Meet LogPoint managers in the CTO team

    LogPoint’s Tech Hub in the CTO office in Copenhagen is a great place to work [...]

  • What is SOAR? A complete guide to Security Orchestration, Automation and Response

    What is SOAR and why do you need it? Mid-sized businesses mistakenly think that a [...]

  • LogPoint 6.12 speeds up incident response with more contextual awareness

    By Gitte Gade, Product Marketing Manager, LogPointSecurity analysts are often faced with an overwhelming number [...]

  • Logpoint: Modern, Hybrid Workplace

    In the aftermath of the Covid-19 pandemic, we’ve seen the emergence of a new way [...]

  • Update to UEBA gives a better understanding of risks and better view of your security data

    By Gitte Gade, Product Marketing Manager, LogPointWe are happy to announce an update, which will [...]

  • Detecting Conti ransomware – The successor of infamous Ryuk

    by Bhabesh Raj, Associate Security Analytics Engineer Widely believed to be the successor to Wizard Spider's [...]