• NIS2 Fines: An overview of possible penalties for non-compliance.

    NIS2 builds on the requirements of the original directive; it still aims to protect critical infrastructure and organizations within the [...]

  • On Demand: Ease of use with SOAR: Streamline Investigation and Response

    Discover the latest updates to SOAR, bringing ease of work to your security operations platform.In this webinar we will discuss [...]

  • The Rise of Zero Trust Network Security: What You Need to Know

    Organizations face an ever-increasing number of sophisticated cyber threats. Traditional network security models, which rely on perimeter-based defenses, are no [...]

  • Big Data and Cybersecurity: A Powerful Union for a Safer Digital Age

    In the interconnected world we inhabit, data drives our decisions, businesses, and even our daily lives. But with great power [...]

  • How to Build a SOC Team: A Cyber Security Shield Against Digital Threats

    In today's interconnected world, the risk of cyber threats and attacks is ever-present. The escalating frequency and sophistication of cyberattacks [...]

  • Threat Hunting: Collaboration. Harnessing the Power of Teamwork

    In today's ever-evolving cybersecurity landscape, organizations face a growing number of sophisticated threats. To effectively combat these threats, collaboration among [...]

  • On Demand: Overcoming the compliance challenges with BCS for SuccessFactors

    Even though SAP SuccessFactors contains some of the organization’s most sensitive and regulated data, it does not natively have a [...]

  • SOX Cybersecurity Compliance – What is it?

    SOX or The Sarbanes-Oxley Act (SOX) was passed in 2002 in the USA and requires that all publicly traded companies [...]

  • What is SIEM? The Ultimate Guide to Security Information and Event Management

    Data protection and cyber threat detection are crucial for businesses in today's landscape. Security Information & Event Management (SIEM) plays [...]

  • PaperCut Vulnerability CVE-2023-27350: Detecting exploitation attempts

    by Anish Bogati & Rabindra Dev Bhatta, Security Research - Updated May 8th 2023PaperCut is a popular print management software [...]

  • Phishing: Logpoint SOAR deep dive – Achieving a 77% reduction in time to resolution

    Phishing is a cyber-attack where an adversary sends fraudulent emails, text messages, or other electronic communication to deceive recipients into [...]

  • On Demand: The Importance of Cybersecurity Technology in SAP Business Transformation

    The webinar is now on demand and is hosted by Logpoint and has Marc Noergaard from Deloitte as a guest [...]