• Webinar on demand: Increase your security compliance posture with Logpoint

    Compliance is one of the biggest hurdles for any business and is only getting more [...]

  • Webinar on demand: What’s new in Logpoint – Free up resources and optimize them with Converged SIEM

    Speakers, Sergio Lozano Alvarez, Product Marketing Manager, Edy Almer, Product Director.Familiarize yourself with Logpoint's latest [...]

  • Endpoint Automated Investigation and Response

    Presenters: Sergio Lozano Alvarez, Product Marketing Manager, Louis Worrell – Sales Engineer An increasing number of [...]

  • Emerging Threat: RedLine Stealer Malware Outbreak – A Comprehensive Guide to Anatomy, Detection, and Response

    By Swachchhanda Shrawan Poudel & Anish Bogati; Security ResearchRedLine Stealer, the malicious software that was [...]

  • A comprehensive guide to detecting Ransomware-as-a-Service using Logpoint

    By Nilaa Maharjan and Anish Bogati, Security Research Foreword: Ransomware is a type of [...]

  • On Demand: Webinar – Why NIS2 is a Gamechanger

    On-demand Webinar Why NIS2 is a Gamechanger The NIS2 directive adopted by the European Parliament [...]

  • On Demand: Webinar – Speed up incident response with enhanced observability

    The latest update of Logpoint’s Converged SIEM is here!Security analysts will receive a wide set [...]

  • On Demand: Accelerate TDIR with AgentX Endpoint Security.

    Introducing AgentX, a brand new Endpoint Security element that's native to our Converged SIEM platform.AgentX [...]

  • Critical Infrastructure: Financial Data

    Cybersecurity is an essential practice for safeguarding data within business-critical systems and applications.Criminals are likely [...]

  • A BOLDMOVE by the Chinese Hackers: Exploiting Fortinet Systems

    By Nilaa Maharjan, Security Research.ContentsKey FindingsWhich Products and Versions are Affected?Making a BOLD statementBoldly going [...]

  • Uncovering illegitimate Crypto-Mining Activity (Cryptojacking) in the Enterprise: Utilizing Network Logs for Investigation and Remediation

    By Swachchhanda Shrawan Poudel, Security ResearchContentsCrypto mining fast factsThe current landscape of crypto miningHow cyber-miners [...]

  • What does a CISO need to know about SAP SECURITY?

    by Sükrü ilkel Birakoglu, Senior DirectorSAP Systems had their evolution in years from closed mainframes [...]