• Petya/NotPetya ransomware

    A new ransomware outbreak named "Petya", similar to the WannaCry malware was seen on June 27, [...]

  • Introducing the WannaCry application

    After our blog post on Sunday regarding the WannaCry malware breakout, LogPoint today is excited to [...]

  • Responding to the WannaCry malware

    Update: Read our latest blog post on our newly released WannaCry ApplicationAs WannaCry has wrecked havoc over [...]

  • Big Data Analytics

    Teaching the Big Boys to ShareJake Anthony – Sales Engineering Manager, LogPointBig Data and Big [...]

  • Detecting ransomware with LogPoint

    By Thorsten Mandau Senior Pre-Sales Consultant, CISSP, LogPoint - February 2017Ransomware is doubtless a rising threat nowadays, putting [...]

  • Ingesting vulnerability management data to LogPoint

    February 2017Getting Qualys VM data into LogPoint is something many of our customers have been [...]

  • Threat Intelligence: The other side of security

    There are almost as many definitions of Threat Intelligence as there are security vendors!In my [...]

  • How to: Create long-term complex correlations with alert feedback

    By Julien Soukhavong, Security Consultant, November 16, 2016.Feedback from correlated events can be extremely useful for [...]

  • A better way of updating LogPoint

    By Christian Have, VP Product & innovation, November 7, 2016.We have all been there; we just [...]

  • How to reduce the impact of ransomware

    By Claus Løppenthien, Senior Solutions Specialist, October 27, 2016. Updated March 2023 One of the [...]

  • Normalization part II

    By Thomas Have, VP Product Development, 22 August 2016Welcome to the second instalment of our [...]

  • Creating realtime, moving dashboards for Big-Screen Operations

    Christian Have LogPoint as a product has many ways of visualising data that is [...]