NIS2 Fines: An overview of possible penalties for non-compliance.
NIS2 builds on the requirements of the original directive; it still aims to protect critical infrastructure and organizations within the [...]
On Demand: Ease of use with SOAR: Streamline Investigation and Response
Discover the latest updates to SOAR, bringing ease of work to your security operations platform.In this webinar we will discuss [...]
The Rise of Zero Trust Network Security: What You Need to Know
Organizations face an ever-increasing number of sophisticated cyber threats. Traditional network security models, which rely on perimeter-based defenses, are no [...]
Big Data and Cybersecurity: A Powerful Union for a Safer Digital Age
In the interconnected world we inhabit, data drives our decisions, businesses, and even our daily lives. But with great power [...]
How to Build a SOC Team: A Cyber Security Shield Against Digital Threats
In today's interconnected world, the risk of cyber threats and attacks is ever-present. The escalating frequency and sophistication of cyberattacks [...]
Threat Hunting: Collaboration. Harnessing the Power of Teamwork
In today's ever-evolving cybersecurity landscape, organizations face a growing number of sophisticated threats. To effectively combat these threats, collaboration among [...]
On Demand: Overcoming the compliance challenges with BCS for SuccessFactors
Even though SAP SuccessFactors contains some of the organization’s most sensitive and regulated data, it does not natively have a [...]
SOX Cybersecurity Compliance – What is it?
SOX or The Sarbanes-Oxley Act (SOX) was passed in 2002 in the USA and requires that all publicly traded companies [...]
What is SIEM? The Ultimate Guide to Security Information and Event Management
Data protection and cyber threat detection are crucial for businesses in today's landscape. Security Information & Event Management (SIEM) plays [...]
by Anish Bogati & Rabindra Dev Bhatta, Security Research - Updated May 8th 2023PaperCut is a popular print management software [...]
Phishing: Logpoint SOAR deep dive – Achieving a 77% reduction in time to resolution
Phishing is a cyber-attack where an adversary sends fraudulent emails, text messages, or other electronic communication to deceive recipients into [...]
On Demand: The Importance of Cybersecurity Technology in SAP Business Transformation
The webinar is now on demand and is hosted by Logpoint and has Marc Noergaard from Deloitte as a guest [...]