• The ultimate SIEM pricing guide

    Struggling with SIEM pricing complexity? Explore our guide for insights into various models, hidden costs, and why Logpoint's transparent approach stands out.

  • Emerging Threat: Cactus, a new player in the ransomware game – Is it the last?

    Fast FactsCactus ransomware has been active since March 2023 and has been targeting high-profile targets [...]

  • The difference between SIEM and EDR (SIEM vs EDR)

    Sometimes different tools can have overlapping functionalities/capabilities, which may prove to be confusing to decision-makers. [...]

  • Phishing and Quishing – Email Investigation and Response Using Logpoint

    Fast FactsPhishing is the most common form of cybercrime, with an estimated 3.4 billion spam [...]

  • Introducing Vulnerability Monitoring Analyzer: Your SAP Security Patch Solution

    Streamline SAP security patch management to safeguard your business from unnecessary threats.SAP continually releases security [...]

  • Emerging Threat: APT-29 – The Not So Cozy Bear

    The Dukes, or Cozy Bear, is a heavily financed, deeply dedicated, and efficiently coordinated cyber [...]

  • Preventing data exfiltration with Logpoint

    Losing control over your organization’s data is one of the main concerns for businesses and [...]

  • Use Case: An example of threat hunting with Converged SIEM

    Originally posted July 2019 - Updated October 2023Threat hunting is gaining relevance by the day [...]

  • CVE-2023-38831: WinRAR – Decompression or Arbitrary Code Execution

    By Nischal Khadgi, Swachchhanda Shrawan Poudel, and Anish Bogati - (Security Research Team)Fast FactsWith over [...]

  • Emerging Threat: Akira, Not a CyberPunk Movie – A Very Real Ransomware Threat

    Fast FactsEmerging in March 2023, Akira ransomware has been grabbing daily headlines with its relentless [...]

  • NIS2 Fines: An overview of possible penalties for non-compliance.

    NIS2 builds on the requirements of the original directive; it still aims to protect critical [...]

  • Reduce time to investigate and respond with practical SOC-focused features

    Nowadays not a day goes by without a cyberattack. In 2022, organizations worldwide detected nearly [...]