• Webinar on Demand- Infrastructure and Cloud Security

    Title: Infrastructure and Cloud SecurityPresenters: Sergio Lozano Álvarez and Adrien DebosschereDescriptionThe security challenge remains the [...]

  • End of the year Report: The cybersecurity rollercoaster of 2023

    Global cyber onslaughts were witnessed in 2023 across industries, affecting many organizations, and exposing millions [...]

  • Webinar on demand: Maximizing your investment in Converged SIEM with Threat Hunting

    Presenters: Sergio Lozano Alvarez (Product Marketing Manager), Henrik Berggren (Senior Sales Engineer).Key Webinar Info: Threat hunting [...]

  • Webinar on demand: Reducing the risk of data exfiltration with Converged SIEM

    Webinar Details: Presenters: Gail Carpenter, Head of Field and Channel Marketing, Nils Krumrey - Senior Sales [...]

  • Webinar on demand: Winning the war against ransomware attacks with Converged SIEM

    Presenters: Sergio Lozano Alvarez, Product Marketing Manager, Louis Worrell - Sales EngineerKey Webinar Info:Ransomware is [...]

  • The ultimate SIEM pricing guide

    Struggling with SIEM pricing complexity? Explore our guide for insights into various models, hidden costs, and why Logpoint's transparent approach stands out.

  • The difference between SIEM and EDR

    Sometimes different tools can have overlapping functionalities/capabilities, which may prove to be confusing to decision-makers. [...]

  • CVE-2023-38831: WinRAR – Decompression or Arbitrary Code Execution

    By Nischal Khadgi, Swachchhanda Shrawan Poudel, and Anish Bogati - (Security Research Team)Fast FactsWith over [...]

  • NIS2 Fines: An overview of possible penalties for non-compliance.

    NIS2 builds on the requirements of the original directive; it still aims to protect critical [...]

  • On Demand: Ease of use with SOAR: Streamline Investigation and Response

    Discover the latest updates to SOAR, bringing ease of work to your security operations platform.In [...]

  • The Rise of Zero Trust Network Security: What You Need to Know

    Organizations face an ever-increasing number of sophisticated cyber threats. Traditional network security models, which rely [...]

  • Big Data and Cybersecurity: A Powerful Union for a Safer Digital Age

    In the interconnected world we inhabit, data drives our decisions, businesses, and even our daily [...]