Blogs

Blogs

How does the payment card industry meet compliance and security standards in an SAP System?

2022-11-30T15:15:09+01:00November 30th, 2022|

The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle branded credit [...]

Read More

Cyber insurance paradigm shift: Protecting the business without the ‘hail mary’ remedy

2022-11-30T16:00:19+01:00November 30th, 2022|

Ransomware attacks and their significant financial threat to organizations have contributed to a growing interest in cyber insurance policies. After [...]

Read More

Emerging Threats: IcedID Beacon – Hunting, Preventing, and Responding to IcedID Malware using Logpoint

2022-11-30T12:44:52+01:00November 17th, 2022|

By Nilaa Maharjan, Security Research Index Why is this threat noteworthy? Ice-breaker #1. Delivering IcedID via contact form Ice-breaker [...]

Read More

Extend the discovery and detection of unusual behavior with the new Logpoint UEBA release

2022-11-09T12:08:40+01:00October 27th, 2022|

By Ira Lisa Kristina Leino, Product Marketing ManagerUEBA enhances the investigation of unknown and insider threats and unusual patterns. The [...]

Read More
Go to Top