by Bhabesh Raj Rai, Associate Security Analyst Engineer Recent Active Directory (AD)...
by Bhabesh Raj, Associate Security Analyst Engineer and Kennet Harpsøe, Senior Cyber Analyst
By Gitte Gade, Product Marketing Manager, LogPoint The Remote Access Trojan (RAT) can be...
by Bhabesh Raj Rai, Associate Security Analytics Engineer On November 22, 2021, Security...
Purpose Though syslog protocol is very common, some customers are experiencing challenges to...
Netflow support is available in LogPoint and requires the Netflow Application to be...
The world of security is changing and evolving, and traditional perimeter security is no...
What is SOAR and why do you need it? Mid-sized businesses mistakenly think that a SOAR...
by Bhabesh Raj, Associate Security Analytics Engineer Widely believed to be the successor to
by Bhabesh Raj Rai, Associate Security Analytics Engineer On September 7, 2021, Microsoft...
Cobalt Strike, first released in 2012, is a commercial adversary simulation tool and is...
By Nils Krumrey, UK Presales Lead, LogPoint Cyberattacks are getting increasingly...