• Critical Infrastructure: Emails – Why are they such a target?

    Emails house a treasure trove of data, but what kind of data do they contain? [...]

  • A crowning achievement: Exploring the exploit of Royal ransomware

    By Anish Bogati, Security ResearchContentsFast FactsRoyal analysisAnalysis of an older version of RoyalDetecting Royal using [...]

  • A crowning achievement: Exploring the exploit of Royal ransomware

    By Anish Bogati, Security ResearchContentsFast FactsRoyal analysisAnalysis of an older version of RoyalDetecting Royal using [...]

  • What is “Supplier Diversity” and how do you monitor it with Logpoint BCS for SAP solutions?

    by Sükrü ilkel Birakoglu, Senior Director Supplier diversity is a business strategy that ensures a diverse [...]

  • Logpoint 2023 predictions: The year of the business-driven CISO

    By Christian HaveAs 2023 closes in it’s time to make our predictions for the cybersecurity [...]

  • Emerging Threats: Emotet-ually Unstable – The resurgence of a nuisance

    By Anish Bogati, Logpoint Global Services and Security ResearchContentsTL;DRWhat is Emotet?Fast FactsBackgroundEmotet operations, tactics and [...]

  • Understanding cyber risk as a “business risk” at senior management level

    By Andrew Lintell  The C-suite cares about cybersecurity now more than ever. Every [...]

  • Detect, manage and respond: Clop ransomware

    TL;DRThere is a growing complexity of ransomware development and threat actors who are continuously adding [...]

  • Hunting and remediating BlackCat ransomware

    By Anish Bogati and Bibek Thapa Magar; Security ResearchTL;DR Known by many names, including ALPHV, [...]

  • How does the payment card industry meet compliance and security standards in an SAP System?

    The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for [...]

  • Secure your SAP system from web-based attacks with the latest Logpoint release

    By Martha Chrisander, Head of Product MarketingMultiple vulnerabilities published in CVEs and SAP Security Notes [...]

  • Cyber insurance paradigm shift: Protecting the business without the ‘hail mary’ remedy

    Ransomware attacks and their significant financial threat to organizations have contributed to a growing interest [...]