• Critical Infrastructure: KRITIS – How does the German IT Security Act (BSI) impact cybersecurity?

    by Sükrü ilkel Birakoglu, Senior Director The German IT Security Act 2.0 passed by the German [...]

  • Critical Infrastructure: Five biggest threats to banks

    When it comes to complex and demanding cybersecurity jobs, being a CISO or analyst in [...]

  • How can MSSPs leverage knowledge for multiple customers? Tips & Tricks for MSSPs

    By: Gitte Gade, Product Marketing ManagerA 2022 study showed that the number one problem MSSP [...]

  • Embracing randomness to detect threats through entropy

    By Bhabesh Raj Rai, Security ResearchContentsWhat is Entropy?The calculationUse cases using the entropy methodLayer your [...]

  • Hive hunter: The tools and tactics to track down Hive ransomware

    By Rabindra Dev Bhatta, Security ResearchContentsFast FactsTechnical analysisHunting Hive with LogpointInvestigation and response with LogpointRemediation [...]

  • Critical Infrastructure: Cybersecurity And The World Economy

    You may have noticed that, over the last two years, it seems that cyberattacks are [...]

  • Critical Infrastructure: Emails – Why are they such a target?

    Emails house a treasure trove of data, but what kind of data do they contain? [...]

  • A crowning achievement: Exploring the exploit of Royal ransomware

    By Anish Bogati, Security ResearchContentsFast FactsRoyal analysisAnalysis of an older version of RoyalDetecting Royal using [...]

  • A crowning achievement: Exploring the exploit of Royal ransomware

    By Anish Bogati, Security ResearchContentsFast FactsRoyal analysisAnalysis of an older version of RoyalDetecting Royal using [...]

  • What is “Supplier Diversity” and how do you monitor it with Logpoint BCS for SAP solutions?

    by Sükrü ilkel Birakoglu, Senior Director Supplier diversity is a business strategy that ensures a diverse [...]

  • Logpoint 2023 predictions: The year of the business-driven CISO

    By Christian HaveAs 2023 closes in it’s time to make our predictions for the cybersecurity [...]

  • Emerging Threats: Emotet-ually Unstable – The resurgence of a nuisance

    By Anish Bogati, Logpoint Global Services and Security ResearchContentsTL;DRWhat is Emotet?Fast FactsBackgroundEmotet operations, tactics and [...]