• Critical Infrastructure: Cybersecurity and protecting governmental data

    Large databases housing valuable information are an appealing target for threat actors. After all, it’s [...]

  • ProxyNotShell: Detecting exploitation of zero-day Exchange server vulnerabilities

    by Bhabesh Raj Rai, Security ResearchOn September 29, 2022, Microsoft confirmed reports of adversaries exploiting [...]

  • Logon And Password Security in SAP Systems – How to keep them safe using Logpoint SIEM and BCS for SAP

    by Sükrü ilkel Birakoglu, Senior Director Business Critical Systems house a wealth of business-critical data relating [...]

  • What are the advantages of SIEM+SOAR vs XDR (Extended Detection & Response)

    XDR offerings are gaining popularity at an exponential rate. Many cybersecurity vendors have adapted the [...]

  • Protect your business and configuration data: ABAP/4 code security in SAP systems – safety starts at development

    by Sükrü ilkel Birakoglu, Senior Director In all common programming languages, faults during development may lead [...]

  • Our market-leading SIEM solution is the best fit for MSSPs

    As volumes of data increase exponentially, businesses are seeking more and more help from Managed [...]

  • 5 investments that every MDR should make

    Managed Detection and Response (MDR) services play a hugely valuable role for their clients.Some clients [...]

  • The first 5 tools needed for an MSSP’s locker

    A Managed Security Service Provider’s (MSSP) number one priority is to ensure that clients stay [...]

  • SAP HANA: What are the big benefits of an often-underestimated log source?

    By Dmitry Gutsko, SAP Security ExpertWe know that SAP database systems are often overlooked when [...]

  • What the Quack: Hunt for the QBOT with Logpoint

    -Nilaa Maharjan Logpoint Global Services & Security ResearchExecutive Summary:QakBOT, also spelled Quakbot is an old [...]

  • Shifting Priorities: Why MSSPs need to act now to innovate and continue to evolve their offerings

    Matthew Rhodes, Regional Director, MSSP and Consulting PartnersManaged Security Service Providers (MSSPs) find themselves faced [...]

  • Detect, mitigate and respond to WDigest attacks with Logpoint

    by Nilaa Maharjan, Security ResearchInternal penetration testing often requires security specialists to attempt to extract [...]